IESG Narrative Minutes

Narrative Minutes of the IESG Teleconference on 2010-04-22. These are not an official record of the meeting.

Narrative scribe: John Leslie (The scribe was sometimes uncertain who was speaking.)

Corrections from: (none)

1 Administrivia

  1. Roll Call 1134 EDT Amy:
  2. Bash the Agenda
  3. Approval of the Minutes of the past telechat
  4. Review of Action Items from last Telechat

2. Protocol Actions

2.1 WG Submissions

2.1.1 New Items

  1. A Framework for Session Initiation Protocol User Agent Profile Delivery (Proposed Standard)
    draft-ietf-sipping-config-framework-17
    Token: Robert Sparks
    IPR: Nortel's Statement of IPR related to draft-ietf-sipping-config-framework-15.txt
    Discusses/comments (from ballot 1779):
    1. Jari Arkko: Comment [2010-04-22]:
      I think the configuration model is overly complicated and some of the design decisions do not IMO work well in the Internet environment.
    2. Lars Eggert: Comment [2010-04-20]:
      Section 3.2., paragraph 5: If by "bandwidth constraints" you mean *available* bandwidth, that'd be a bad example - it's clearly not configuration data.
      Section 3.3., paragraph 5: " Additional profile types may also be specified." By whom?
      Section 6.2.2., paragraph 1: "The implementer SHOULD use their DNS domain name..." If you leave this a SHOULD, you cannot depend on it being unique.
      Section 6.2.3., paragraph 1: s/must attempt to/MUST/
      Section 6.10., paragraph 1: If it's expected to be infrequent, you can easily specify a minimum period
    3. Alexey Melnikov: Discuss [2010-04-21]:
      I have some major concerns about lack of data model definition in this document. Without that it is not possible to write 2 interoperable implementations.
    4. Alexey Melnikov: Comment [2010-04-21]:
      5.2.1. Securing Profile Enrollment: are you saying that Digest authentication MUST only be used over TLS?
      6.2.1. profile-type: the values are case insensitive?
      6.2.3. effective-by parameter: Does this value have an upper limit?
      9.1. Local-network profile: suggest changing "suport digest" to "support Digest authentication" or similar.
    5. Tim Polk: Comment [2010-04-22]:
      I support the discuss positions from Sean, Dan, Peter, and Alexey.
    6. Dan Romascanu: Discuss [2010-04-22]:
      1. I share Alexey's concern about the difficulty of proving interoperability in the absence of a data model.
      2. In the operational model describe in Figure 3 - I cannot understand the difference between a 'Device Provider' and a 'Local Network Provider'.
      3. I am unconfortable with the way bootstraping of devices is described in Section 5.3.1.
      4. I find the discussion about Device Types in section 5.3.3 rather expedited and superficial
    7. Peter Saint-Andre: Discuss [2010-04-21]:
      In Section 5.1.4.2, the guidelines for generating a device identifier seem overly complex.
      In Sections 5.2.1 and 5.2.2, this specification references RFC 2818... should be draft-ietf-sip-domain-certs, not Section 3.1 of RFC 2818.
    8. Peter Saint-Andre: Comment [2010-04-21]:
      Section 2 uses the term "entity" inconsistently
      Section 5.1.1: What are the provider's credentials here?
      Section 5.2 uses the term "privacy" when the term "data confidentiality" is meant.
      Section 9.1: "a PDS may not implement any authentication requirements or TLS". Does this mean that a PDS might happen to operate insecurely, or that it is allowed to (MAY) operate insecurely?
      Section 11 includes organizational affiliations. This information is not typically included in acknowledgements
    9. Sean Turner: Discuss [2010-04-22]:
      1) Section 5.3.5: Figure 1 does not show the interaction between the network element. Should Figure 1 be updated or should Section 5.3.5 be fixed?
      2) Sec 5.2.1: I'd like to see a security consideration added... MD5... was "reasonable choice" but it probably isn't anymore
      3) The term "mandatory" is not defined and it seems to be specifying conformance requirements.
    10. Sean Turner: Comment [2010-04-22]:
      5.2: I noted the same thing as Peter did wrt the use of the term "privacy".
      5.2.1: I also noted the same thing Alexey did wrt to the use of Digest authentication over TLS.
      5.3.2: I'd like to see some discussion about what happens when the device uses a cached device...
      several editorial suggestions

    Telechat:

  2. Expressing SNMP SMI Datatypes in XML Schema Definition Language (Proposed Standard)
    draft-ietf-opsawg-smi-datatypes-in-xsd-06
    Token: Dan Romascanu
    Note: Scott Bradner (sob@harvard.edu) is the document shepherd.
    Discusses/comments (from ballot 3113):
    1. Jari Arkko: Discuss [2010-04-22]:
      I am troubled by the fact that this does not cover InetAddress from RFC 2851, i.e., only IPv4 addresses can be mapped.
    2. Gonzalo Camarillo: Comment [2010-04-22]:
      Acronyms such as SNMP and SMI should be expanded in the Abstract
    3. David Harrington: Comment [2010-04-19]:
      (empty)
    4. Tim Polk: Comment [2010-04-21]:
      Global nit: The phrasing is inconsistent when datatypes are named.
      I found sections 5.2 through 5.5 a bit confusing since the simple types defined in section 4 (e.g., OctetString and IpAddress) seem to be used interchangably with their XSD base types.
    5. Peter Saint-Andre: Comment [2010-04-21]:
      I think the regex for IpAddress could be shortened...
    6. Sean Turner: Comment [2010-04-19]:
      1) In the security considerations: "Security considerations for any given SMI MIB module are likely to be relevant..." When is it not relevant?
      2) Is there any reason we can't refer to a later version of the ASN.1?

    Telechat:

  3. Forward Error Correction Grouping Semantics in Session Description Protocol (Proposed Standard)
    draft-ietf-mmusic-rfc4756bis-07
    Token: Robert Sparks
    Note: Document Shepherd: Jean-Francois Mule (jf.mule@cablelabs.com)
    Discusses/comments (from ballot 3328):
    1. Gonzalo Camarillo: Discuss [2010-04-22]:
      I do not think it makes sense to update the ABNF syntax.
    2. Lars Eggert: Discuss [2010-04-20]:
      Updates: "4756, 3388bis, 5576 (if approved)" I'd like to dissect the relationships between these documents
    3. Lars Eggert: Comment [2010-04-20]:
      Section 1., paragraph 1: FEC doesn't provide complete reliability - it provides *improved* reliability under loss (compared to no FEC), but only to a certain loss rate.
      Section 3., paragraph 0: It would be good to also discuss how exactly this document updates 3388bis and 5576.
    4. Adrian Farrel: Discuss [2010-04-22]:
      RFC 4756 needs to be a normative reference (how else can you update it); I would think that RFC 3388 should also be a normative reference since I-D.ietf-mmusic-rfc3388bis is updated and itself updates RFC 3388.
      Section 3.2: It is not clear from reading this section how there is any "Requirement and Changes from RFC 4756" described.
      Section 4.3: you should describe what a receiver does if the 'ssrc-group' attribute is used at some other level.
      Section 4.4 I find the backward compatibility section confusing.
    5. Adrian Farrel: Comment [2010-04-22]:
      A number of minor nits that you might fix to save the RFC Editor some time and effort
    6. David Harrington: Discuss [2010-04-21]:
      1) I would like to support Lars's discuss regarding 3833bis
      2) "the FEC framework requires the source and repair packets to be carried in different streams." Can you provide a reference for that statement?
      3) If fecframe DOES require this, I will want to understand why it is REQUIRED, and why this spec should be allowed to ignore the requirement.
    7. David Harrington: Comment [2010-04-21]:
      1) "It should be noted that"... this clause can be eliminated.
    8. Russ Housley: Comment [2010-04-20]:
      Please consider the Gen-ART Review comments from David Black
    9. Alexey Melnikov: Discuss [2010-04-13]:
      1) 4.4. SDP Offer-Answer Model and Backward Compatibility Considerations: How can a document put a requirement on an implementation that doesn't comply with this document?
      2) 4.5. ABNF Syntax: "group-attribute..." I can't find the document where <space$gt; is defined... You should specify where <token> is defined. I think you meant RFC 4566.
    10. Alexey Melnikov: Comment [2010-04-13]:
      (empty)
    11. Tim Polk: Comment [2010-04-21]:
      I support Alexey's discuss with respect to section 4.4.
    12. Peter Saint-Andre: Comment [2010-04-19]:
      Please spell out "SSRC" on first use.
      it is sufficient to say "The receiver SHOULD perform integrity checks..."
    13. Sean Turner: Comment [2010-04-21]:
      Two nits on the security considerations

    Telechat:

  4. Session Initiation Protocol (SIP) INFO Method and Package Framework (Proposed Standard)
    draft-ietf-sipcore-info-events-07
    Token: Robert Sparks
    Note: Adam Roach (adam@nostrum.com) is the document shepherd.
    Discusses/comments (from ballot 3361):
    1. Gonzalo Camarillo: Comment [2010-04-22]:
      Abstracts should not contain references
    2. Lars Eggert: Discuss [2010-04-19]:
      Section 7.3., paragraph 2: I'm really missing a statement in this document that more strongly discourages the sending of frequent or large (and especially frequent and large) INFO requests/responses. I decided to make this a discuss, because unlike other SIP extensions, this one is completely under the control of the applications, and the application writers do need to understand the tradeoffs here.
    3. Russ Housley: Comment [2010-04-21]:
      Please consider the Gen-ART Review comments from Brian Carpenter
    4. Alexey Melnikov: Discuss [2010-04-21]:
      1) 10.6. SIP Option Tags: This reference looks Normative
      2) 10.5. Info Package Parameters: "Info Package parameters defined for specific Info Packages can share the name with parameters defined for other Info Packages, but the parameter semantics are specific to the Info Package for which they are defined." DISCUSS DISCUSS (will most likely clear once discussed with IESG): Is this actually a good idea?
      3) 11.4. Creation of the Info Packages Registry: "The Info Package Name is a case insensitive token." This is in contradiction with a statement in section 6.2
    5. Alexey Melnikov: Comment [2010-04-21]:
      4.2.2. UA Procedures: Did you mean to reference Appendix A or Section 9 here?
    6. Dan Romascanu: Comment [2010-04-22]:
      I support Lars' DISCUSS.
    7. Peter Saint-Andre: Discuss [2010-04-20]:
      This is a "discuss-discuss" to air some issues that I'm sure have already been part of the long conversation within the WG.
      Given that legacy INFO usage is so widely considered harmful, it would help motivate advancement to Proposed Standard if this document provided a more detailed description of legacy INFO usage and how the WG came to the conclusion that some uses of INFO for exchange of application data are in fact not abusive.
      1a. Section 9.2: text is potentially misleading... It would be clearer to also say in Section 9.2 that UAs can indicate which packages they support by sending a Recv-Info header in error responses and in invites.
      1b. Section 9.2: text does not clearly describe how the use of Info-Package overcomes the interoperability problems with legacy INFO
      2a. Section 9.1: text is not particulately helpful... we cannot legislate that any new usage of INFO must, shall, will, or ought to use Info-Package.
      2b. Section 9.3: text is not strong enough... This document needs to more strongly encourage user agents to prefer Info-Package usage over legacy INFO usage
    8. Peter Saint-Andre: Comment [2010-04-20]:
      Section 4.2.4: "If the receiver of a request which contains a Recv-Info header field rejects the request, both the sender and receiver of the request MUST roll back to the set of Info Packages which was used before the request was sent." This implies that an application must cache the previous Recv-Info data rather than overwriting the old data when it receives the new data. Was this intentional?
      In Appendix A, please spell out the acronyms on first use
    9. Sean Turner: Comment [2010-04-21]:
      I support Lars' DISCUSS position
      Sec 6.1: Define "Mandatory".

    Telechat:

  5. Common YANG Data Types (Proposed Standard)
    draft-ietf-netmod-yang-types-08
    Token: Dan Romascanu
    Note: David Partain (david.partain@ericsson.com) is the document shepherd.
    Discusses/comments (from ballot 3368):
    1. Jari Arkko: Discuss [2010-04-21]:
      My main issue is with the patterns and my (in)ability to verify them. The issues are also related to what the specification draws in from the SNMP world and what kind of assumptions are valid there...
      Shouldn't the description fields at least explain what the patterns are indicating?
      AFAICT this pattern restricts what numbers the OIDs can begin with. Do those restrictions match what the various ISO and IANA registries on this matter say?
      I have serious trouble mapping the complex pattern definitions to other things, such as the canonical text representation rules. How do we know that the patterns are correct?
    2. Jari Arkko: Comment [2010-04-21]:
      From the definition of a date object: Did you mean ABNF (Augmented Backus-Naur Form) instead? You should also expand the acronym and add a reference.
    3. Gonzalo Camarillo: Comment [2010-04-22]:
      (empty)
    4. Lars Eggert: Comment [2010-04-19]:
      (empty)
    5. Alexey Melnikov: Comment [2010-04-21]:
      (reference) [RFC3490]: Should this be pointing to IDNA 2008?
    6. Sean Turner: Comment [2010-04-21]:
      two editorial suggestions

    Telechat:

  6. Sieve Email Filtering: Delivery Status Notifications and Deliver-By Extensions (Proposed Standard)
    draft-freed-sieve-notary-07
    Token: Alexey Melnikov
    Note: This is a Sieve WG document, despite the name. Cyrus Daboo is the document shepherd.
    Discusses/comments (from ballot 3391):
    1. Stewart Bryant: Comment [2010-04-20]:
      spurious text appears in the IAN section
    2. Adrian Farrel: Discuss [2010-04-22]:
      There are a couple of error conditions described... You should say how these errors are handled. This may be as simple as a reference to another RFC.
    3. Adrian Farrel: Comment [2010-04-22]:
      three editorial suggestions
    4. Russ Housley: Comment [2010-04-21]:
      Please consider the Gen-ART Review comments by Spencer Dawkins
    5. Alexey Melnikov: Discuss [2010-04-21]:
      Holding DISCUSS on a part of SecDir review by Tero Kivinen
      [issues about bytime parameter]
    6. Tim Polk: Comment [2010-04-21]:
      Section 5. "All of these tests fail unconditionally if ..." suggest "The envelope test fails unconditionally for each of these envelope-part strings if..."
    7. Sean Turner: Comment [2010-04-22]:
      I support Alexey's DISCUSS position

    Telechat:

  7. Extensions to the Path Computation Element Communication Protocol (PCEP) for Point-to-Multipoint Traffic Engineering Label Switched Paths (Proposed Standard)
    draft-ietf-pce-pcep-p2mp-extensions-10
    Token: Adrian Farrel
    Note: JP Vasseur (jpv@cisco.com) is the document shepherd.
    Discusses/comments (from ballot 3393):
    1. Stewart Bryant: Discuss [2010-04-20]:
      The text under figure 2 looks to be incorrect, the length in the IPv6 case is surely n*16 + 4, and not n*16 bytes.
    2. Stewart Bryant: Comment [2010-04-20]:
      "Four values are possible for the leaf type field": the list entry numbers are I think the values, but this is not a clear way to show it.
      If the authors think there will ever be more than 4 operations, they should consider using a registry.
    3. David Harrington: Discuss [2010-04-21]:
      [21 items... see linked text]
    4. David Harrington: Comment [2010-04-21]:
      I found the document difficult to read and review.
      The requirements section 2 doesn't use sentences, so it is difficult to understand what the requirements actually are without going to the REQS document; if you need to do that anyway, why bother summarizing here?
      3.1.2 discusses a TLV, and then decribes the type and value; where's the label?
      in 3.4, the last sentence says "must be present in this definition." In the definition or in messages?
      etc...
    5. Tim Polk: Discuss [2010-04-19]:
      my reading of the security considerations in 5440 indicates that these mechanisms are all optional with the sole exception of TCP-MD5, so "conform[ing] to the security requirements of [RFC5440]" isn't as productive as it sounds.
      I think that this section should call out the mechanisms in 5440 that are most important for addressing the attacks noted in the current text.
    6. Dan Romascanu: Discuss [2010-04-22]:
      The DISCUSS is partially based on issues raised initially by Fred Baker in the OPS-DIR review.
      4.2. Information and Data Models "As described in [PCE-P2MP-REQ], MIB objects MUST be supported for PCEP extensions specified in this document."
      As the existing PCEP MIB document does not support P2PM, it was agreed by the WG at IETF77, to create a new PCEP MIB module specifically to support PCEP P2MP. If such a MIB document already existed it would be good to be included as an Informative Reference. Otherwise some text should be added to 4.2 on this respect.
    7. Dan Romascanu: Comment [2010-04-22]:
      4.6. Impact on Network Operation "It is expected that use of PCEP extensions specified in this document does not have significant impact on network operations."
      While the addition of PCEP-P2MP extensions may have minimal impact on the level of traffic and operations, the applications that are enabled by activating these extensions may result in increased traffic and operational complexity.
    8. Sean Turner: Discuss [2010-04-22]:
      PCEP requires use of TCP-MD5 with recognition of its failings, specifically mentioning that TCP-AO was not yet complete. But as TCP-AO has now passed the IESG, should there be some recognition of that change?
    9. Sean Turner: Comment [2010-04-22]:
      I support Tim's DISCUSS position too
      Some new comments based on Russ Mundy's SECDIR review: RFC4875 Security Considerations requires that the ingress LSR of a P2MP TE LSP the leaves for the P2MP LSP for use in multi-vendor deployments. Although it's not clear that this document needs to provide this requirement, I wanted to flag the requirement in case that it had been overlooked.

    Telechat:

  8. Policy for Registering SRTP Transforms (Proposed Standard)
    draft-ietf-avt-register-srtp-02
    Token: Robert Sparks
    Note: Keith Drage (keith.drage@alcatel-lucent.com) is the document shepherd
    Discusses/comments (from ballot 3394):
    1. Stewart Bryant: Comment [2010-04-20]:
      I could not figure out what SRTP meant until I found it in the table of references at the bottom of the document
    2. Lars Eggert: Comment [2010-04-19]:
      Not sure if an IANA URL can be a normative reference
    3. Adrian Farrel: Comment [2010-04-22]:
      Some minor points if you have the document open for revision...
    4. David Harrington: Comment [2010-04-17]:
      section 3 - why not just eliminate this section, and move the security considerations section to be numbered section 3?
    5. Russ Housley: Discuss [2010-04-22]:
      I think that the same approach used in CMS, TLS, and IPsec should be used here too. That is, algorith specifications are published as Informational RFCs or published by some other standards body that can be referenced (such as NIST FIPS Publications). Then, a standards track RFC specifies the conventions for using of the algorithm in the particular security protocol.
    6. Alexey Melnikov: Comment [2010-04-13]:
      2. Update to RFC3711 "This document updates Section 6 and Section 12 of [RFC3711]... After publication of this document, new SRTP transforms can be defined using either an informational or standards track RFC." I think it would be good to clarify that that means an AD sponsored Informational RFC.
    7. Dan Romascanu: Comment [2010-04-22]:
      "However, existing documents require extensions to SRTP and extensions to SRTP keying to be published as Standards-Track RFCs."
      For clarity and consistency with the previous phrase where [RFC2026] is explicitely mentioned, it would be better to specify here what documents are referred
    8. Sean Turner: Discuss [2010-04-19]:
      This is a discuss-discuss (i.e., nothing for the authors to do - at this time):
      I'm not entirely sure why this ID is needed at all because I think the text in RFC 3967 | BCP 97 trumps whatever text is in RFC 3711.
    9. Sean Turner: Comment [2010-04-19]:
      I'd really like to see the set of OLD/NEW text for the sentences that you want changed. It's pretty clear in section 6 what you want to change, but I don't see where there's a MUST in section 12 for algorithm documents to be standards track.

    Telechat:

2.1.2 Returning Items

  1. IP Mobility Support for IPv4, revised (Proposed Standard)
    draft-ietf-mip4-rfc3344bis-10
    Token: Jari Arkko
    Note: Back on the agenda to solicit 1 more vote!
    Pete McCann (pete.mccann@motorola.com) is the document shepherd.
    Discusses/comments (from ballot 3359):
    1. Jari Arkko: Comment [2010-03-11]:
      (empty)
    2. Adrian Farrel: Comment [2010-04-15]:
      Jari tells me that the Erratum has now been rejected based on WG consensus. I will clear my Discuss.
    3. Russ Housley: Comment [2010-03-08]:
      The Gen-ART Review by Miguel Garcia on 2010-03-08 raised a few editorial issues. Please consider them.
    4. Sean Turner: Comment [2010-04-21]:
      1) Sec 1.6: It's a little ODD that there's a requirement in the terminology section (see SPI paragraph). Can this be moved to somewhere else in the document?
      2) Sec 1.9: r/it is recommended that new Mobile IP extensions follow one of the two new extension/it is RECOMMENDED that new Mobile IP extensions follow one of the two new extension ?

    Telechat:

2.2 Individual Submissions

2.2.1 New Items

  1. Web Linking (Proposed Standard)
    draft-nottingham-http-link-header-09
    Token: Alexey Melnikov
    Note: Julian Reschke <julian.reschke@greenbytes.de> is the document shepherd.
    As per discussion with Peter, I will deal with updating the "hub" registration (to get a better description and a more stable reference) post approval of this document.
    Discusses/comments (from ballot 3161):
    1. Jari Arkko: Comment [2010-04-22]:
      (empty)
    2. Lars Eggert: Comment [2010-04-20]:
      [TBD]@ietf.org and [TBD-2]@ietf.org mailing lists need to be created and an RFC Editor Note needs to ask them to substitute the final names.
    3. Tim Polk: Discuss [2010-04-19]:
      This is a discuss-discuss. To be clear, I am not asking for any change in the document at this time.
      Is there any precedent for the following text?: "Within at most 14 days of the request, the Designated Expert(s) will either approve or deny the registration request... Registration requests that are undetermined for a period longer than 21 days can be brought to the IESG's attention (using the iesg@iesg.org mailing list) for resolution."
      It sounds like the IESG could be fielding a lot of registration requests.
    4. Tim Polk: Comment [2010-04-19]:
      (empty)
    5. Peter Saint-Andre: Discuss [2010-04-20]:
      referencing a website does not appear to be consistent with "Specification Required" as mentioned in Section 6.2.1 and defined in RFC 5226.
    6. Peter Saint-Andre: Comment [2010-04-20]:
      I concur with Tim Polk's concern regarding increased load on the IESG resulting from the (seemingly novel) 14-day rule for review of registration requests.
    7. Robert Sparks: Discuss [2010-04-20]:
      Should there be additional guidance to the expert reviewer on what to check for in the specification required by "Specification Required"? Is it sufficient for registration to have a document that contains only the template, or is that document expected to have more semantic content?
    8. Sean Turner: Comment [2010-04-19]:
      (empty)

    Telechat:

  2. Application of RFC 2231 Encoding to Hypertext Transfer Protocol (HTTP) Header Fields (Proposed Standard)
    draft-reschke-rfc2231-in-http-11
    Token: Alexey Melnikov
    Note: Graham Klyne <GK@ninebynine.org> is the document shepherd
    Discusses/comments (from ballot 3327):
    1. Adrian Farrel: Discuss [2010-04-22]:
      Why isn't RFC 2231 a normative reference?
      I can't find an Appendix in RFC 2231.
      RFC 2231 doesn't actually use the term "escape" or "escaling". It might be nice to harmonise on the terms used by theat RFC.
    2. Russ Housley: Comment [2010-04-22]:
      In section 3.2: "Producers MUST NOT use character sets other than..." Better to say: "Producers MUST use either the "UTF-8" ([RFC3629]) or the "ISO-8859-1" ([ISO-8859-1]) character set."
    3. Tim Polk: Comment [2010-04-19]:
      In section 3.2: "Producers MUST NOT use character sets other than "UTF-8" ([RFC3629]) or "ISO-8859-1" ([ISO-8859-1]). Extension character sets (ext-charset) are reserved for future use."
      ext-charset does not appear in the ABNF. Should it?
    4. Peter Saint-Andre: Comment [2010-04-19]:
      In Section 3.2, there appears to be confusion between the terms "mime-charset" and "ext-charset".
    5. Sean Turner: Comment [2010-04-18]:
      Sec 3.3, Is the link to the WG ticket stable enough for a standards track document?

    Telechat:

  3. Asymmetric Key Packages (Proposed Standard)
    draft-turner-asymmetrickeyformat-05
    Token: Tim Polk
    Note: Carl Wallace (cwallace@cygnacom.com) is the Document Shepherd
    Discusses/comments (from ballot 3337):
    1. Lars Eggert: Comment [2010-04-19]:
      (empty)
    2. Russ Housley: Discuss [2010-04-21]:
      I tried to compile the ASN.1 and got errors.
    3. Russ Housley: Comment [2010-04-21]:
      Please consider the media-subtype-related comment from the Gen-ART Review by Roni Even
    4. Alexey Melnikov: Comment [2010-04-22]:
      (empty)
    5. Peter Saint-Andre: Discuss [2010-04-19]:
      I second Alexey's discuss

    Telechat:

  4. Algorithms for Asymmetric Key Package Content Type (Proposed Standard)
    draft-turner-asymmetrickeyformat-algs-01
    Token: Tim Polk
    Note: Carl Wallace (cwallace@cygnacom.com) is the document Shepherd
    Discusses/comments (from ballot 3338):
    1. Alexey Melnikov: Comment [2010-04-14]:
      (empty)
    2. Peter Saint-Andre: Discuss [2010-04-19]:
      I second Alexey's discuss

    Telechat:

  5. A Dedicated RPSL Interface Identifier for Operational Testing (Proposed Standard)
    draft-haberman-rpsl-reachable-test-03
    Token: Ron Bonica
    Discusses/comments (from ballot 3377):
    1. Jari Arkko: Discuss [2010-04-22]:
      I do not believe the document needs to be any clearer with respect to the security implications or what protocols are being offered for test. However, I did have one practical concern:
      "Tests involving the advertised address(es) SHOULD be rate limited to no more than ten probes in a five minute window unless prior arrangements are made with the maintainer of the attribute."
      I would suggest that the text explictly calls out a conservative limit (e.g., the above one) on any automatic probing, while allowing manual testing without any hard limits.
    2. Gonzalo Camarillo: Comment [2010-04-22]:
      The acronym RPSL should be expanded in the Title.
    3. David Harrington: Comment [2010-04-17]:
      section 2: "can advertise" - should this be a MAY or SHOULD?
      section 3: "maintaner of the attribute" - would this be better stated as "operator of the target network"?
    4. Russ Housley: Discuss [2010-04-21]:
      The Gen-ART Review by Vijay Gurbani raised a point that deserves a response
    5. Tim Polk: Discuss [2010-04-22]:
      +1 Sean's and Peter's discuss...
      The missing security considerations section should address any controls that are needed on intermediate systems (e.g., gateways, routers or firewalls) as well as the advertised reachable host.
    6. Peter Saint-Andre: Discuss [2010-04-19]:
      The document lacks the required security considerations section.
      the NIC Handle system is no longer supported as widely as it once was; therefore inclusion of the <nic-handle> does not necessarily or even reliably "provide a link to contact information" as claimed in the specification.
    7. Peter Saint-Andre: Comment [2010-04-19]:
      Please demarcate the rows of the table in Section 2 -- it is confusing to read.
      There are no references for the value-types <ipv6-address> and <ipv4-address>... these are defined in RFC 4012 and RFC 2622 respectively but references would be helpful. Similarly there is no reference for the value-type <nic-handle>
    8. Sean Turner: Discuss [2010-04-17]:
      This ID needs a security considerations section.

    Telechat:

2.2.2 Returning Items

  1. (none)

3. Document Actions

3.1 WG Submissions

3.1.1 New Items

  1. NAT/Firewall NSIS Signaling Layer Protocol (NSLP) (Experimental)
    draft-ietf-nsis-nslp-natfw-24
    Token: Lars Eggert
    Note: The document shepherd is Jukka Manner (jukka.manner@tkk.fi).

    IPR: Nortel Networks Statement about IPR claimed in draft-ietf-nsis-nslp-natfw-04
    Discusses/comments (from ballot 1545):
    1. Dan Romascanu: Discuss [2010-04-22]:
      This document is defined as Experimental but there is nothing inside that describes the criteria of the experiment and the limitations in deployment which have been subject of extensive discussion. I believe that we need to include a reference to draft-ietf-nsis-ext-07.txt and text that points to that I-D for the status of the document and deployment limitations.

    Telechat:

  2. RMD-QOSM - The Resource Management in Diffserv QOS Model (Experimental)
    draft-ietf-nsis-rmd-19
    Token: Lars Eggert
    Note: Jukka Manner (jukka.manner@tkk.fi) is the document shepherd.
    IPR: Telefonaktiebolaget LM Ericsson (publ)'s Statement about IPR related to draft-ietf-nsis-rmd-17
    Discusses/comments (from ballot 3181):
    1. Russ Housley: Comment [2010-04-21]:
      The promises in the IPR Statement apply only if this document is published on the standards track, which is not happening at this time.
    2. Dan Romascanu: Discuss [2010-04-22]:
      This document is defined as Experimental but there is nothing inside that describes the criteria of the experiment and the limitations in deployment which have been subject of extensive discussion.
    3. Dan Romascanu: Comment [2010-04-22]:
      Should not the title reflect the fact that we deal with an NSIS QoS Model?
    4. Sean Turner: Discuss [2010-04-22]:
      The SECDIR review included a number suggestions for the security considerations section. The authors noted that the suggestions were useful, but due to the cloud computing disaster in Iceland their travel plans have been disrupted resulting in them not being able to address the comments until after the May 6th telechat.

    Telechat:

  3. Using and Extending the NSIS Protocol Family (Informational)
    draft-ietf-nsis-ext-07
    Token: Lars Eggert
    Note: Document Shepherd: Martin Stiemerling (martin.stiemerling@neclab.eu)
    Discusses/comments (from ballot 3309):
    1. Robert Sparks: Discuss [2010-04-20]:
      The descriptions of the various allocation policies in ietf-nsis-ntlp don't seem to match what's in the actual document.

    Telechat:

  4. Use of Status-Server Packets in the Remote Authentication Dial In User Service (RADIUS) Protocol (Informational)
    draft-ietf-radext-status-server-06
    Token: Dan Romascanu
    Note: Bernard Aboba (bernard_aboba@hotmail.com) is the document shepherd.
    Discusses/comments (from ballot 3363):
    1. Jari Arkko: Comment [2010-04-22]:
      The document says: "The "hop by hop" functionality of Status-Server packets is useful to RADIUS clients attempting to determine the status of elements on the path between the client and a server."
      This should read: ... determine the status of the first element on the path between ... (because you are not forwarding from the proxy and there are no security associations from a client to proxies beyond the first one, there is no way to test proxies 2 and onwards)
      The document notes on the discussion of codes and port numbers: "However, as the category of [RFC2866] is Informational, this conflict is acceptable."
      This is merely a statement about the status of various RFCs. Personally, the substantive change is that this new RFC would allow a new code to be used on port 1813. I think it should do an "Updates: RFC 2866" and get it over with.
    2. Lars Eggert: Discuss [2010-04-19]:
      Section 4.1., paragraph 2: "The client SHOULD also have a configurable global timer..." First, since it is only RECOMMENDED to implement Tw and not REQUIRED, clients need not do so. How do clients without Tw decide that a server has not responded?
      Second, there is no discussion on what rate clients should be using when *issuing* Status-Server queries.
    3. Lars Eggert: Comment [2010-04-19]:
      Section 1812., paragraph 4: Without congestion control, implementing this MAY guarantees that the minimum amount of useful (= non-Status-Server) work will be done.
      Section 4.3., paragraph 3: This uses Status-Server messages as an overload detection mechanism. They need to be sent in a way that will back off the rate under overload, because otherwise the scheme can turn into an overload *generation* mechanism.
      Section 4.5., paragraph 17: If Status-Server messages are being sent in a way that is congestion controlled (i.e., the rate is reduced under overload).
    4. Russ Housley: Comment [2010-04-21]:
      Please consider the comments from the Gen-ART Review by Francis Dupont [15 items]
    5. Tim Polk: Comment [2010-04-22]:
      I support Lars' and Peter's discuss positions.
    6. Peter Saint-Andre: Discuss [2010-04-20]:
      Is the use of MD5 in generating the Response Authenticator subject to collision attacks? If not, it would be helpful to describe why not, and provide a reference to RFC 4270. If so, then the security considerations need to be updated.
    7. Peter Saint-Andre: Comment [2010-04-20]:
      Given that the Request Authenticator should be unpredictable and unique, a reference to RFC 4086 would be appropriate.
      Please add a reference to RFC 1321 for the definition of MD5.
    8. Robert Sparks: Comment [2010-04-22]:
      Support Lars' discuss re: limiting message rates
      If there is a reason to perform a major edit on this document, please consider splitting the "documenting what was deployed" and "recommending fixes" into clearly separate sections (if not documents).
    9. Sean Turner: Comment [2010-04-21]:
      I support Peter's discuss.
      Additionally, I noted the same thing Peter did wrt to random numbers.
      Section 3: In the Request Authenticator description the two paragraphs repeat that Request Authentication SHOULD be unpredictable and then says why. Maybe the second paragraph should be tweaked...

    Telechat:

3.1.2 Returning Items

  1. (none)

3.2 Individual Submissions Via AD

3.2.1 New Items

  1. Using Trust Anchor Constraints During Certification Path Processing (Informational)
    draft-wallace-using-ta-constraints-02
    Token: Tim Polk
    Discusses/comments (from ballot 3373):
    1. Alexey Melnikov: Discuss [2010-04-17]:
      DISCUSS DISCUSS: I would like to understand the scope (applicability statement) for this document and also why it is Informational (as opposed to PS).
      7.2. Informative References " [I-D.draft-ietf-pkix-ta-format]..." I think this reference is Normative, considering that the document is using some ASN.1 structures defined in it.
    2. Peter Saint-Andre: Discuss [2010-04-19]:
      I concur with the DISCUSSes lodged by Alexey Melnikov.
      In addition, the security considerations do not document what attacks are made possible if implementations do not enforce trust anchor constraints and if trust anchor information is not securely stored.
    3. Sean Turner: Comment [2010-04-22]:
      I support Alexey's DISCUSS position. I think this ought to be standards track.

    Telechat:

  2. MIKEY-TICKET: An Additional Mode of Key Distribution in Multimedia Internet KEYing (MIKEY) (Informational)
    draft-mattsson-mikey-ticket-03
    Token: Tim Polk
    IPR: Telefonaktiebolaget LM Ericsson (publ)'s Statement about IPR related to draft-mattsson-mikey-ticket-00
    Discusses/comments (from ballot 3380):
    1. Sean Turner: Discuss [2010-04-22]:
      Is Appendix A a normative part of the specification or is it informative? I think you should clearly state which it is in the first sentence because it was not clear to me that I'd have to implement it if I wanted to be conformant.
    2. Sean Turner: Comment [2010-04-22]:
      seven editorial suggestions

    Telechat:

3.2.2 Returning Items

  1. (none)

3.3 Independent Submissions Via RFC Editor

3.3.1 New Items

  1. TCP Cookie Transactions (TCPCT) (Experimental)
    draft-simpson-tcpct-02
    Token: Lars Eggert
    Discusses/comments (from ballot 3392):
    1. David Harrington: Comment [2010-04-21]:
      I support the IESG Writeup

    Telechat:

3.3.2 Returning Items

  1. (none)

1254 EDT no break

4 Working Group Actions

4.1 WG Creation

4.1.1 Proposed for IETF Review

  1. SIP Overload Control (soc)
    Token: Robert

    Telechat:

4.1.2 Proposed for Approval

  1. Decoupled Application Data Enroute (decade)
    Token: Alexey

    Telechat:

  2. Congestion Exposure (conex)
    Token: Lars

    Telechat:

4.2 WG Rechartering

4.2.1 Under evaluation for IETF Review

  1. (none)

4.2.2 Proposed for Approval

  1. (none)

5. IAB News We can use

  1. Russ: Danny said no news

6. Management Issues

  1. CCSA and T-MPLS (Adrian Farrel)

    Telechat:

  2. Proposed LS to SA2 from NetExt (Jari Arkko)

    Telechat:

  3. MPLS-TP documents for IESG review (Stewart Bryant)

    Telechat:

7. Agenda Working Group News

1404 EDT Adjourned



Appendix: Snapshot of discusses/comments

(at 2010-04-22 08:33:12 PDT)

draft-ietf-sipping-config-framework

  1. Jari Arkko: Comment [2010-04-22]:
    For what it is worth, I think the configuration model is overly
    complicated and some of the design decisions do not IMO work well
    in the Internet environment. For instance, I would prefer discovery
    and probing of the local network conditions as opposed to expecting
    there to be a SIP-specific configuration server that delivers such
    information. For instance, for most networks there will not be
    a reliable way to provide any information about available bandwidth,
    due to inability to estimate number of concurrent users, radio
    conditions, and so on.
  2. Lars Eggert: Comment [2010-04-20]:
    Section 3.2., paragraph 5:
    >    In more complex deployments, devices connect via a local network that
    >    is not controlled by the SIP Service Provider, such as devices that
    >    connect via available public WiFi hot spots.  In such cases, local
    >    network providers may wish to provide local network information such
    >    as bandwidth constraints to the devices.
    
      If by "bandwidth constraints" you mean *available* bandwidth, that'd
      be a bad example - it's clearly not configuration data. Is there a
      better example or a better way to phrase this?
    
    Section 3.3., paragraph 5:
    >    Additional profile types may also be specified.
    
      By whom? The IETF in future RFCs? Anyone out there deploying this
      framework? (Section 5.3.6 also doesn't make this clear.)
    
    Section 6.2.2., paragraph 1:
    >    The
    >    implementer SHOULD use their DNS domain name (e.g., example.com) as
    >    the value of the "vendor" parameter so that it is known to be unique.
    
      If you leave this a SHOULD, you cannot depend on it being unique.
      (Because two vendors may decide to not follow the SHOULD and pick
      conflicting values.)
    
    Section 6.2.3., paragraph 1:
    >    A value of 0 (zero) indicates that the subscribing
    >    user agent must attempt to make the profiles effective immediately
    >    (despite possible service interruptions).
    
      s/must attempt to/MUST/
    
    Section 6.10., paragraph 1:
    >    The rate of notifications for the profiles in this framework is
    >    deployment specific, but expected to be infrequent.  Hence, the Event
    >    Package specification does not specify a throttling or minimum period
    >    between NOTIFY requests
    
      If its expected to be infrequent, you can easily specify a minimum
      period that won't interfere with operation and will prevent accidental
      bursts due to misconfiguration, etc. Please do so?
  3. Alexey Melnikov: Discuss [2010-04-21]:
        [Updated DISCUSS]
    
    I have some major concerns about lack of data model definition in this document.
    Without that it is not possible to write 2 interoperable implementations. The
    document says that specific configuration formats are going to be specified in
    future documents. Are there any examples of such configuration formats?
    
    [The remaining text is unchanged:]
    
    I have a couple of very minor points and some questions about this document:
    
    1)
    5.1.1.  Profile Enrollment
    
          Upon failure to obtain the profile using any methods specified in
          this framework, the device MAY provide a user interface to allow
          for user intervention.  This can result in temporary, one-time
          data to bootstrap the device.  Such temporary data is not
          considered to be "configured" and SHOULD NOT not be cached across
          resets.
    
    Did you mean "SHOULD be cached" (the "NOT not" part)?
    
    2) ABNF needs to be a Normative reference for this document. 
        
  4. Alexey Melnikov: Comment [2010-04-21]:
    5.2.1.  Securing Profile Enrollment
    
       Transmission of
       sensitive profile data also requires message integrity.  This can be
       accomplished by configuring the device with, or by ensuring that the
       discovery process during profile enrollment provides, a SIPS URI
       resulting in TLS establishment ([RFC5246]).  TLS also prevents
       offline dictionary attacks when digest authentication is used.  Thus,
       in the absence of TLS, the device MUST NOT respond to any
       authentication challenges.
    
    The last sentence: are you saying that Digest authentication MUST only be used
    over TLS?
    
    6.2.1.  profile-type
    
       Profile-type   = "profile-type" EQUAL profile-value
       profile-value  =  profile-types / token
       profile-types  = "device" / "user" / "local-network"
    
    So just to confirm, the values are case insensitive?
    
    6.2.3.  effective-by parameter
    
       Effective-By =  "effective-by" EQUAL 1*DIGIT
    
    Does this value have an upper limit?
    
    9.1.  Local-network profile
    
       Alternatively, certain deployments may require the entities - device
       and the PDS - to authenticate each other prior to successful profile
       enrollment.  Such networks may pre-configure user identities to the
       devices and allow user-specific local-network profiles.  In such
       networks the PDS will support digest, and the devices are configured
    
    COMMENT: suggest changing "suport digest" to "support Digest authentication" or
    similar.
  5. Tim Polk: Comment [2010-04-22]:
    I support the discuss positions from Sean, Dan, Peter, and Alexey.
  6. Dan Romascanu: Discuss [2010-04-22]:
        1. I share Alexey's concern about the difficulty of proving interoperability in
    the absence of a data model. Actually my conern is even broader, there are so
    many cases, and types of profiles, and the framework allows for newer types to
    be added that I cannot really see how parts of this document can be tested for
    interoperability. Maybe it would be useful to specify what of the whole text in
    the RFC is normative - probably most of section 5 and section 6, but not more.
    
    2. In the operational model describe in Figure 3 - I cannot understand the
    difference between a 'Device Provider' and a 'Local Network Provider'. If a
    device is pre-configured, than its configuration is not subject to the framework
    (is it?). If not in all cases I know the 'device provider' is the same as the
    network provider (which needs not be only local BTW). Actually networks are
    configured by configuring devices.
    
    3. I am unconfortable with the way bootstraping of devices is described in
    Section 5.3.1. There are too many methods of doing the same thing, and there is
    no requirement for a mandatory method for compliance. Which of the ways of
    bootstrapping a device with the required identities and credentials is required,
    or if more than one is supported which one is preferred?
    
    4. I find the discussion about Device Types in section 5.3.3 rather expedited
    and superficial in what concerns devices that do not directly communicate with
    any users like gateways, media servers or SIP servers. These ones have other
    functions than of an UA and may be configured by different methods and
    protocols, not only the ones that are being mentioned in this document. How do
    configuration operations that are performed part by using the framework, part by
    using other protocols work together? 
        
  7. Dan Romascanu: Comment [2010-04-22]:
    
        
  8. Peter Saint-Andre: Discuss [2010-04-21]:
        [new DISCUSSes added 2010-04-21]
    
    In Section 5.1.4.2, the guidelines for generating a device identifier seem
    overly complex. Why not simply re-use the Instance ID guidelines from Section
    4.1 of RFC 5626, since the Instance ID is already a "URN that uniquely
    identifies the device"?
    
    In Sections 5.2.1 and 5.2.2, this specification references RFC 2818 (HTTP over
    TLS) for authentication and server identity checking. Given that communication
    here occurs over SIP, the normative reference really should be draft-ietf-sip-
    domain-certs, not Section 3.1 of RFC 2818. 
        
  9. Peter Saint-Andre: Comment [2010-04-21]:
    Section 2 uses the term "entity" inconsistently -- for example, a Device can
    "contain entities such as a DHCP client" but the term SIP Service Provider can
    "refer to ... "public entities". I suggest changing the first instance to
    "application" and the second to "services".
    
    Section 5.1.1 states:   
    
       The device needs certain data to create an enrollment request,
       form a Request-URI, and authenticate to the network.  This
       includes the profile provider's domain name, identities and
       credentials.
    
    What are the provider's credentials here? Does this in fact mean the device's or
    user's credentials with the provider? If so, please express this more clearly.
    
    Section 5.2 uses the term "privacy" when the term "data confidentiality" is
    meant.  See RFC 4949 for details (and if possible please align the usage of
    security terminology with RFC 4949).
    
    Section 9.1 that "a PDS may not implement any authentication requirements or
    TLS". Does this mean that a PDS might happen to operate insecurely, or that it
    is allowed to (MAY) operate insecurely?
    
    Section 11 includes organizational affiliations.  This information is not
    typically included in acknowledgements, since it goes against the IETF tradition
    of treating people as individuals, not as corporate representatives.  In any
    case, many of the affiliations are out of date.
  10. Sean Turner: Discuss [2010-04-22]:
        1) Section 5.3.5 says:
    
      While this framework does not impose specific constraints on any such
      framework, it does allow for the propagation of profile content to
      the PDS (specifically the PCC) from a network element or the device.
    
    Figure 1 does not show the interaction between the network element.  Should
    Figure 1 be updated or should Section 5.3.5 be fixed?
    
    2) Sec 5.2.1 caused me to pause a bit.  Sec 5.2.1 requires 3921 which requires
    digest authentication (HTTP Digest) which uses MD5 (section 5.2.2 also requires
    digest authentication).  MD5 is well liked anymore.  I'd like to see a security
    consideration added that says something to the effect of: when RFC 3921 was
    published MD5 might have been specified because it was "reasonable choice" but
    it probably isn't anymore; use of another hash alg (e.g., SHA-256) is
    preferred/recommended as specified in some sip document (not sure where it
    should point).
    
    3) The term "mandatory" is not defined and it seems to be specifying conformance
    requirements.  Please point to where it is defined or modify the text is Sec 6.2
    with something like:
    
    OLD:
    
       m - mandatory
       s - SHOULD be provided
       o - optional
    
    NEW:
    
       m - MUST be provided
       s - SHOULD be provided
       o - OPTIONAL to be provided 
        
  11. Sean Turner: Comment [2010-04-22]:
    1) 5.1.4.2: r/subscription URI/Subscription URI
    
    2) 5.2: I noted the same thing as Peter did wrt the use of the term "privacy".
    
    3) 5.2.1: I also noted the same thing Alexey did wrt to the use of Digest
    authentication over TLS.
    
    4) 5.3.2: r/device must enroll/device MUST enroll
    
    5) 5.3.2: I'd like to see some discussion about what happens when the device
    uses a cached device, user, and local network profile and it's no the same
    domain/local network which provided the cached data.
    
    6) 5.3.4: r/This framework recommends the device profile to provide the
    identities and credentials due to a couple of reasons./This framework recommends
    the device profile provide the identities and credentials due to a couple of
    reasons.
    
    7) 5.3.4: r/i.e., data that cannot be compromised/i.e., data that cannot be
    disclosed to unauthorized parties
    
    8) 6.10: r/NOTIFY requests/NOTIFY requests.
    
    9) 9: r/Compromise of sensitive data/Disclosure of sensitive data
    
    10) 9: r/For sensitive data that should not be subject to snooping, privacy is
    also required./For sensitive data that should not be disclosed to unauthorized
    parties, privacy is also required.
    
    11) 9.1: r/In such networks the PDS will support digest, and .../In such
    networks the PDS will support digest authentication, and ...

draft-ietf-opsawg-smi-datatypes-in-xsd

  1. Jari Arkko: Discuss [2010-04-22]:
        I am troubled by the fact that this does not cover InetAddress from
    RFC 2851, i.e., only IPv4 addresses can be mapped. I realize that
    the document says it only concerns itself with RFC 2578 datatypes,
    but I do not think we should be publishing any RFCs in 2010 that
    do not fully support both IPv4 and IPv6. Or is there some companion
    document that defines the other types? 
        
  2. Jari Arkko: Comment [2010-04-22]:
    
        
  3. Gonzalo Camarillo: Comment [2010-04-22]:
    Acronyms such as SNMP and SMI should be expanded in the Abstract
  4. David Harrington: Comment [2010-04-19]:
    
        
  5. Tim Polk: Comment [2010-04-21]:
    Global nit
    
    The phrasing is inconsistent when datatypes are named.  Here are a few examples:
        XSD datatype "hexBinary"
       "hexBinary" XSD datatype
        XSD "string" datatype
    This is a nitpick, but a consistent phrasing is a little easier on the reader.
    
    (1) I suspect this is clear to the expected audience, so this is a comment
    rather than a
    discuss, but I found sections 5.2 through 5.5 a bit confusing
    since the simple types defined
    in section 4 (e.g., OctetString and IpAddress)
    seem to be used interchangably with their XSD base types.
    
    Consider 5.5 as an example:
    
      5.5.  ObjectIdentifier
    
       This XSD datatype corresponds to the SMI "OBJECT IDENTIFIER"
       datatype.
    
       The XSD "string" datatype is also the natural choice to represent an
       ObjectIdentifier as XML output, for the same reasons as for the
       IpAddress choice. 
    
    I did a lot of flipping back and forth between sections to sort this out.  It
    might be
    clearer to say something like
    
      5.5.  ObjectIdentifier
    
       The XSD datatype "ObjectIdentifier" corresponds to the SMI "OBJECT
    IDENTIFIER"
       datatype.
    
       "Objectidentifier" has the XSD base type "string", which is the natural
    choice to
       represent an ObjectIdentifier as XML output, for the same reasons
    as for the
       IpAddress choice.
    
    (2) Security Considerations nit
    
    s/are likely to be relevant/will be relevant/
  6. Peter Saint-Andre: Comment [2010-04-21]:
    I think the regex for IpAddress could be shortened to something like this (but I
    am not a regex expert!):
    
    ((0|[1-9]?[0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}(0|[1-9]?[0-9]|1[0-
    9][0-9]|2[0-4][0-9]|25[0-5])
  7. Sean Turner: Comment [2010-04-19]:
    I have two comments wrt to this ID:
    
    1) In the security considerations it says:
    
      "Security considerations for any given SMI MIB module are
       likely to be relevant to any XSD/XML mapping of that MIB module"
    
    Shouldn't the phrase "likely to be" be removed?  When is it not relevant?
    
    2) Is there any reason we can't refer to a later version of the ASN.1?  I.e.,
    instead of '87 point to '02?

draft-ietf-mmusic-rfc4756bis

  1. Gonzalo Camarillo: Discuss [2010-04-22]:
        With respect to having this document update RFC3388bis, I guess the reason is
    that Section 4.5 of this document updates the ABNF syntax of the group attribute
    by adding the new semantics values. The thing is that the complete ABNF syntax
    for that attribute would need to include all the semantics that have been
    registered by the IANA so far:
    
    http://www.iana.org/assignments/sdp-parameters
    
    I do not think it makes sense to update the ABNF syntax. Other RFCs that have
    defined semantics values in the past have not done that. My suggestion would be
    to remove Section 4.5 and avoid having this document update RFC3388bis.
    
    Also, the last line of Section 4.5 contains a normative statement that is
    already present in Section 4 of RFC3388bis. That statement should be removed as
    well while removing the whole Section 4.5. 
        
  2. Gonzalo Camarillo: Comment [2010-04-22]:
    
        
  3. Lars Eggert: Discuss [2010-04-20]:
        
    INTRODUCTION, paragraph 1:
    > Updates:  4756, 3388bis, 5576 (if approved)
    
      DISCUSS: I'd like to dissect the relationships between these documents
      for a bit. First, does this ID really update 4756, but does not
      obsolete it? I'm no media expert, but the way I read it, this seems to
      be a complete replacement for 4756. Second, why is this document
      updating a yet-to-be-published ID? It would be much less confusing if
      3388bis were modified to directly include the changes that this
      document makes to it. 
        
  4. Lars Eggert: Comment [2010-04-20]:
    Section 1., paragraph 1:
    >    Any application that needs a reliable transmission over an unreliable
    >    packet network has to cope with packet losses.  Forward Error
    >    Correction (FEC) is an effective approach that provides reliable
    >    transmission particularly in multicast and broadcast applications
    >    where the feedback from the receiver(s) is potentially limited.
    
      FEC doesn't provide complete reliability - it provides *improved*
      reliability under loss (compared to no FEC), but only to a certain
      loss rate.
    
    Section 3., paragraph 0:
    > 3.  Requirements and Changes from RFC 4756
    
      It would be good to also discuss how exactly this document updates
      3388bis and 5576. (3388bis is mentioned, but at least to me it's
      unclear what the update here is; 5576 is not mentioned.)
  5. Adrian Farrel: Discuss [2010-04-22]:
        
    Two of my Discuss issues overlap somewhat with points raised by other ADs. I
    hope they can all be addressed with relatively small text changes.
    
    ---
    RFC 4756 needs to be a normative reference (how else can you update it)
    
    I would think that RFC 3388 should also be a normative reference since
    I-D.ietf-mmusic-rfc3388bis is updated and itself updates RFC 3388.
                                                                          
    ---
    Section 3.2
    It is not clear from reading this section how there is any "Requirement
    and Changes from RFC 4756" described.
    I presume that [I-D.ietf-fecframe-framework] describes something that
    cannot be provided by RFC 4756. The text should say so!
    
    ---
    Section 4.3
       Thus, the 'ssrc-group' attribute MUST only be used at the
       media level [RFC5576].
    
    This is fine, but you should describe (presumably with a simple 
    reference to 5576 error handling) what a receiver does if the
    'ssrc-group' attribute is used at some other level.
    
    ---
    Section 4.4
    
    I find the backward compatibility section confusing. There seems to be a
    fix of "does not understand" and "does not support". These are subtly 
    different cases (although the former inevitably encompasses the latter).
    
    For "does not understand" I do not believe that this document can define
    new behaviour. This is because the failure to understand indicates a
    legacy implementation that will not implement any of this specification.
    Thus, your description must give reference to some pre-existing
    specification, and must describe what will happen according to that 
    specification (not what SHOULD happen according to this sepcification).
    
    If you wish to allow a node that supports this specification (i.e.
    "understads") to "not support" the function. Then this is a matter for
    new specification. It is not a backward compatibility function, and
    should be described in a separate section of the document. 
        
  6. Adrian Farrel: Comment [2010-04-22]:
    A number of minor nits that you might fix to save the RFC Editor some
    time and effort.
    
    ---
    Throughout the document, please note that "semantics" should be used as
    a plural.
    
    ---
    Abstract
    s/are more than one/is more than one/
    s/repair flows/repair flow/
    ---
    Abstract
    Expand SSRC
    --
    Section 1
    OLD
      receivers choose receiving
    NEW ??
      receivers choose to receive
    ---
    Section 1
    Expand SSRC
    ---
    Section 3.1
    OLD
      associate source and repair flows together
    NEW
      associate source and repair flows
    ---
    Section 3.1
       This document also
       specifies how the 'group' attribute in SDP is used to group multiple
       repair flows with one or more source flows.
    Please insert reference for the 'group' attribute.
    ---
    Section 4.1
    OLD
      If there are more than one repair flows
    NEW
      If there is more than one repair flow
    ---
    Section 4.1
    s/transitive relation/transitive relationship/
    ---
    Section 4.2
    OLD
      If none of the repair flows are additive
    NEW
      If none of the repair flows is additive
  7. David Harrington: Discuss [2010-04-21]:
        1) I would like to support Lars's discuss regarding 3833bis - why is 3833bis
    simply not modified to include the grouping semantics?
    
    2) "the FEC framework requires the source and repair packets to be carried in
    different streams." Can you provide a reference for that statement? I'm new to
    fecframe, but I read the framework and missed where it said that.
    
    3) If fecframe DOES require this, I will want to understand why it is REQUIRED,
    and why this spec should be allowed to ignore the requirement. 
        
  8. David Harrington: Comment [2010-04-21]:
    1) "It should be noted that" - if you include the rest of the sentence, then it
    IS noted, so this clause can be eliminated.
  9. Russ Housley: Comment [2010-04-20]:
      Please consider the Gen-ART Review comments from David Black:
    
      The IPv4 addresses used in the examples are not from the 192.0.2.0/24
      block of addresses for examples - they appear to be IP Multicast
      addresses, and I'm not sure what IP Multicast addresses are
      appropriate for use in examples.
    
      The 3388bis entry on the Updates: line on the title page is novel.
      Please add an RFC Editor Note to the Abstract asking the RFC Editor
      to replace that with the RFC number assigned to 
      draft-ietf-mmusic-rfc3388bis-04 when it is published.
  10. Alexey Melnikov: Discuss [2010-04-13]:
        I have a couple of comments I would like to discuss before recommending approval
    of this document:
    
    1) 4.4.  SDP Offer-Answer Model and Backward Compatibility Considerations
    
       When a node is offered a session with the "FEC-FR" grouping semantics
       but it does not support line grouping or the FEC grouping semantics,
       the node SHOULD respond to the offer either:
    
    How can a document put a requirement on an implementation that doesn't comply
    with this document? I think the possible responses listed later in this section
    just follow generic behaviour for a responder that doesn't understand the offer.
    (Please correct me if this is not correct.) If that is the case, then I think
    you need to replace the uppercased SHOULD with an informative text, ideally
    pointing to the document that defines the behaviour.
    
       However, if the node does not understand the "FEC" semantics, it
       SHOULD respond to the offer either (1) with an answer that ignores
       the grouping attribute, or (2) with a refusal to the request.  In the
       first case, the sender MUST send a new offer without FEC.
    
    As above.
    
    2) 4.5.  ABNF Syntax:
    
           group-attribute = "a=group:" semantics
                             *(space identification-tag)
    
    I can't find the document where <space> is defined.
    
                 semantics = "LS" / "FID" /
                             "FEC" /      ; from [RFC4756] for backward
                                          ; compatibility
                             "FEC-FR"     ; from [RFCXXXX]
    
        identification-tag = token
    
    You should specify where <token> is defined. I think you meant RFC 4566.
    Please add an ABNF comment to make the clear. 
        
  11. Alexey Melnikov: Comment [2010-04-13]:
    
        
  12. Tim Polk: Comment [2010-04-21]:
    I support Alexey's discuss with respect to section 4.4.
  13. Peter Saint-Andre: Comment [2010-04-19]:
    Please spell out "SSRC" on first use.
    
    The text "It is RECOMMENDED that the receiver SHOULD do integrity check" is
    conformance language overload; it is sufficient to say "The receiver SHOULD
    perform integrity checks..."
  14. Sean Turner: Comment [2010-04-21]:
    Two nits on the security considerations:
    
    1) r/failure of FEC to protect, and/or mishandling of other media payload
    streams/failure of FEC to protect, and/or mishandle other media payload streams
    
    2) r/do integrity check/do an integrity check

draft-ietf-sipcore-info-events

  1. Gonzalo Camarillo: Comment [2010-04-22]:
    Abstracts should not contain references.
  2. Lars Eggert: Discuss [2010-04-19]:
        
    Section 7.3., paragraph 2:
    >    Some applications, like sending of DTMF tones, can generate a burst
    >    of up to 20 messages per second.  Other applications, like constant
    >    GPS location updates, could generate a high rate of INFO requests
    >    during the lifetime of the invite dialog usage.
    >
    >    Furthermore, SIP messages tend to be relatively small, on the order
    >    of 500 Bytes to 32K Bytes.  SIP is a poor mechanism for direct
    >    exchange of bulk data beyond these limits, especially if the headers
    >    plus body exceed the UDP MTU [RFC0768].  Appropriate mechanisms for
    >    such traffic include HTTP [RFC2616], MSRP [RFC4975], or other media
    >    plane data transport mechanisms.
    
      DISCUSS: I'd argue that SIP is a poor mechanism for exchanging data
      starting with much less than 32KB of data... But the issue I was going
      to raise is broader: I'm really missing a statement in this document
      that more strongly discourages the sending of frequent or large (and
      especially frequent and large) INFO requests/responses. Folks simply
      need to understand that the reliability and timeliness of SIP
      exchanges can go down in the real world with the size and the rate of
      the messages, if UDP is used, and depending on the path. I thought for
      a while whether I really want to make this a discuss instead of a
      comment, since this issue is a general SIP problem. I decided to make
      this a discuss, because unlike other SIP extensions, this one is
      completely under the control of the applications, and the application
      writers do need to understand the tradeoffs here. 
        
  3. Lars Eggert: Comment [2010-04-19]:
    
        
  4. Russ Housley: Comment [2010-04-21]:
      Please consider the Gen-ART Review comments from Brian Carpenter:
    
      As a newcomer to the topic, I found the guidance on when to choose the
      Info-Package mechanism and when to choose an alternative (Section 7) a
      little weak. I didn't get a strong sense of when it would be clearly
      idiotic to choose Info-Package (except for bulk data transfer). Maybe
      an Informational document on this would be helpful. Otherwise, the
      mechanism seems at some risk of becoming a catch-all for proprietary
      extensions.
  5. Alexey Melnikov: Discuss [2010-04-21]:
        I've reviewed the document and have a small list of issues I would like to
    discuss before recommending approval of this document:
    
    1) 10.6.  SIP Option Tags
    
       The Info Package specification MAY define SIP option tags, which can
       be used as described in [RFC3261].
    
       The registration requirements for option tags are defined in
       [I-D.peterson-rai-rfc3427bis].
    
    This reference looks Normative, because an INFO package designer might have to
    comply with it.
    
    2) 10.5.  Info Package Parameters
    
       NOTE: Info Package parameters defined for specific Info Packages can
       share the name with parameters defined for other Info Packages, but
       the parameter semantics are specific to the Info Package for which
       they are defined.
    
    DISCUSS DISCUSS (will most likely clear once discussed with IESG): Is this
    actually a good idea?
    
    3) 11.4.  Creation of the Info Packages Registry
    
       The following data elements populate the Info Package Registry.
       o  Info Package Name: The Info Package Name is a case insensitive
          token.
    
    This is in contradiction with a statement in section 6.2:
    
     That is, the Info Package name is case sensitive.
    
          In addition, IANA shall not register multiple Info Package
          names that have identical case-insensitive values. 
        
  6. Alexey Melnikov: Comment [2010-04-21]:
    4.2.2.  UA Procedures
    
       For backward compatibility purpose, even if a UA indicates support of
       the Info Package mechanism, it is still allowed to enable legacy INFO
       usages Appendix A.
    
    Did you mean to reference Appendix A or Section 9 here?
    
    Suggested change in Section 4.2.3:
    
    OLD:
    
       Similar to SDP answers, the receiver can include the same Recv-Info
       header field value in multiple responses (18x/2xx) for the same
       INVITE/re-INVITE transaction, 
       but the receiver MUST NOT include a
       Recv-Info header field value which is different from a 
       value that the receiver has already included in a response for the same 
       transaction.
    
    NEW:
       Similar to SDP answers, the receiver can include the same Recv-Info
       header field value in multiple responses (18x/2xx) for the same
       INVITE/re-INVITE transaction, 
       but the receiver MUST use the same
       Recv-Info header field value (if included) in all responses for the
       same transaction.
  7. Dan Romascanu: Comment [2010-04-22]:
    I support Lars' DISCUSS.
  8. Peter Saint-Andre: Discuss [2010-04-20]:
        This is a "discuss-discuss" to air some issues that I'm sure have already been
    part of the long conversation within the WG.
    
    This document has a dysfunctional relationship with what it labels legacy INFO
    usage. Given that legacy INFO usage is so widely considered harmful, it would
    help motivate advancement to Proposed Standard if this document provided a more
    detailed description of legacy INFO usage and how the WG came to the conclusion
    that some uses of INFO for exchange of application data are in fact not abusive.
    The WG summary is quite helpful in this regard and similar text could be
    included in this document. I would also recommend Appendix A and Section 9 to
    that same area of the document because right now the discussion is quite
    fragmented.
    
    I realize that the foregoing is somewhat vague. More specifically, I am
    concerned about two interrelated issues : (1) interoperability and (2)
    migration.
    
    1. Regarding interoperability...
    
    1a. In Section 9.2, the following text is potentially misleading:
    
       Since legacy INFO usages do not have associated Info Packages, it is
       not possible to use the Recv-Info and Info-Package header fields with
       legacy INFO usages.  That is, a UA cannot use the Recv-Info header
       field to indicate for which legacy INFO usages it is willing to
       receive INFO requests, and a UA cannot use the Info-Package header
       field to indicate for which legacy INFO usage an INFO request is
       associated with.
    
    As explained in Section 3.2.2, that is not quite true:
    
       If a UA receives an INFO request associated with an Info Package that
       the UA has not indicated willingness to receive, the UA MUST send a
       469 (Bad INFO Package) response (see Section 11.6), which contains a
       Recv-Info header field with Info Packages for which the UA is willing
       to receive INFO requests.
    
    It would be clearer to also say in Section 9.2 that UAs can indicate which
    packages they support by sending a Recv-Info header in error responses and in
    invites.
    
    1b. In Section 9.2, the following text does not clearly describe how the use of
    Info-Package overcomes the interoperability problems with legacy INFO:
    
       Due to the problems described above, legacy INFO usages often require
       static configuration about for what type of applications and contexts
       UAs support the INFO method, and the way they handle application
       information transported in INFO messages.  That has caused
       interoperability problems in the industry.  Therefore, a need for a
       well defined and documented description of what the information sent
       in the INFO is used for has been identified.
    
    Describing how Info-Package solves the interop issues might help motivate
    migration away from legacy INFO, which I take to be the main reason we're
    considering this spec in the first place.
    
    2. Regarding migration...
    
    2a. In Section 9.1, the following text is not particulately helpful:
    
       For backward compatibility purpose, this document does not deprecate
       such usages, and does not mandate users to define Info Packages for
       such usages.  However, any new usage of INFO SHALL use the Info
       Package mechanism defined in this specification.
    
    Unfortunately, we cannot legislate that any new usage of INFO must, shall, will,
    or ought to use Info-Package.
    
    2b. In Section 9.3, the following text is not strong enough:
    
       UAs are allowed to enable both legacy INFO usages and Info Package
       usages as part of the same invite dialog usage.
    
    This document needs to more strongly encourage user agents to prefer Info-
    Package usage over legacy INFO usage (e.g., if you receive Info-Package and
    legacy in an invite, prefer Info-Package). In general, this document provides
    few incentives for applications using legacy INFO to migrate toward Info-
    Package; preferring Info-Package over legacy might help. 
        
  9. Peter Saint-Andre: Comment [2010-04-20]:
    In Section 4.2.4, we find the following text:
    
       If the receiver of a request which contains a Recv-Info header field
       rejects the request, both the sender and receiver of the request MUST
       roll back to the set of Info Packages which was used before the
       request was sent.
    
    This implies that an application must cache the previous Recv-Info data rather
    than overwriting the old data when it receives the new data. Was this
    intentional?
    
    In Appendix A, please spell out the acronyms on first use -- I doubt that many
    people know the identity of technologies like ISUP, QSIG, MSCML, or MSML. Also,
    does the DTMF usage belong here? (See DISCUSS about putting this information
    together in one section to motivate the discussion.)
  10. Sean Turner: Comment [2010-04-21]:
    I support Lars' DISCUSS position.
    
    Sec 6.1: Define "Mandatory".  If its meaning is taken from RFC 3291 add
    something like "Mandatory (as defined in RFC3261) ...."

draft-ietf-netmod-yang-types

  1. Jari Arkko: Discuss [2010-04-21]:
        This is an excellent, carefully written spec. I do have a few issues,
    a couple of small bugs and few others that I would like to talk about
    before recommending the approval of this specification. My main issue
    is with the patterns and my (in)ability to verify them. The issues
    are also related to what the specification draws in from the SNMP
    world and what kind of assumptions are valid there (OID value spaces,
    for instance). Unfortunately I am not an SNMP expert, so please help
    me understand this better.
    
    Section 1:
    
        +-----------------+-----------------------------------------------+
        | YANG type       | Equivalent SMIv2 type (module)                |
        +-----------------+-----------------------------------------------+
        ...
        | ip-address      | -                                             |
        | ipv4-address    | -                                             |
        | ipv6-address    | -                                             |
    
    What about InetAddress, InetAddressIPv4, and so on (RFC 2851)?
    It seems that there is a corresponding type, so shouldn't it be
    listed in the table above?
    
    Various types use extensive pattern definitions. For instance, the
    object identifier definition has this pattern:
    
           pattern '(([0-1](\.[1-3]?[0-9]))|(2\.(0|([1-9]\d*))))'
                 + '(\.(0|([1-9]\d*)))*';
    
    I must say that while eat regexps for breakfasts daily, this one was
    a bit too much to chew on. And this is probably simplest one in the
    draft! Shouldn't the description fields at least explain what the
    patterns are indicating?
    
    Also, AFAICT this pattern restricts what numbers the OIDs can begin
    with. Do those restrictions match what the various ISO and IANA
    registries on this matter say? For instance, does the pattern say
    that the first OID value must be a 0, 1 or 2? Why?
    
    This definition:
    
       typedef ipv6-address {
         type string {
           pattern '((:|[0-9a-fA-F]{0,4}):)([0-9a-fA-F]{0,4}:){0,5}'
                 + '((([0-9a-fA-F]{0,4}:)?(:|[0-9a-fA-F]{0,4}))|'
                 + '(((25[0-5]|2[0-4][0-9]|[01]?[0-9]?[0-9])\.){3}'
                 + '(25[0-5]|2[0-4][0-9]|[01]?[0-9]?[0-9])))'
                 + '(%[\p{N}\p{L}]+)?';
           pattern '(([^:]+:){6}(([^:]+:[^:]+)|(.*\..*)))|'
                 + '((([^:]+:)*[^:]+)?::(([^:]+:)*[^:]+)?)'
                 + '(%.+)?';
         }
         description
          "The ipv6-address type represents an IPv6 address in full,
           mixed, shortened and shortened mixed notation.  The IPv6
           address may include a zone index, separated by a % sign.
    
           The zone index is used to disambiguate identical address
           values.  For link-local addresses, the zone index will
           typically be the interface index number or the name of an
           interface. If the zone index is not present, the default
           zone of the device will be used.
    
           The canonical format of IPv6 addresses uses the compressed
           format described in RFC 4291 section 2.2 item 2 with the
           following additional rules: The :: substitution must be
           applied to the longest sequence of all-zero 16-bit chunks
           in an IPv6 address. If there is a tie, the first sequence
           of all-zero 16-bit chunks is replaced by ::. Single
           all-zero 16-bit chunks are not compressed. The canonical
           format uses lower-case characters and leading zeros are
           not allowed. The canonical format for the zone index is
           the numerical format as described in RFC 4007 section
           11.2.";
    
    Uses its own definition of a canonical format, but wouldn't referencing
    draft-ietf-6man-text-addr-representation be more appropriate? That
    draft has been stuck for a while, but has cleared almost all discusses
    now, FYI...
    
    Also, this is just a comment but I have serious trouble mapping
    the complex pattern definitions to other things, such as the
    canonical text representation rules. How do we know that the
    patterns are correct? 
        
  2. Jari Arkko: Comment [2010-04-21]:
    From the definition of a date object:
    
           using the following ABFN (replacing double quotes with
    
    Did you mean ABNF (Augmented Backus-Naur Form) instead? You should also
    expand the acronym and add a reference.
  3. Gonzalo Camarillo: Comment [2010-04-22]:
    
        
  4. Lars Eggert: Comment [2010-04-19]:
    
        
  5. Alexey Melnikov: Comment [2010-04-21]:
       [RFC3490]  Faltstrom, P., Hoffman, P., and A. Costello,
                  "Internationalizing Domain Names in Applications (IDNA)",
                  RFC 3490, March 2003.
    
    Should this be pointing to IDNA 2008?
  6. Sean Turner: Comment [2010-04-21]:
    Sec 2: r/overview over/overview of
    Sec 2: r/(if any)/(- indicates there is no corresponding SMIv2 type) X2

draft-freed-sieve-notary

  1. Stewart Bryant: Comment [2010-04-20]:
    The following spurious text appears in the IAN section:
    
        To: iana@iana.org
        Subject: Registration of new Sieve extensions
  2. Adrian Farrel: Discuss [2010-04-22]:
        
    There are a couple of error conditions described...
    
    Section 4
    
       The envelope test's ADDRESS-PART argument assumes the string being
       tested has the syntax of an email address.  None of the new envelope
       parts defined here have address syntax, accordingly, it is an error
       to specify an ADDRESS-PART argument in conjunction with these new
       envelope parts.
    
    Section 7
    
       It is an error to specify :bymode and :bytrace without :bytime.
    
    You should say how these errors are handled. This may be as simple as a 
    reference to another RFC. 
        
  3. Adrian Farrel: Comment [2010-04-22]:
    Section 1
    
    For clarity, I suggest...
    s/users may not be allowed/users might not be allowed/
    or
    s/users may not be allowed/users are not allowed/
    
    ---
    
    Section 1
    s/sieve/Sieve/
    
    ---
    
    Section 4
    OLD
       None of the new envelope
       parts defined here have address syntax
    NEW
       None of the new envelope
       parts defined here has address syntax
  4. Russ Housley: Comment [2010-04-21]:
      Please consider the Gen-ART Review comments by Spencer Dawkins:
    
      Section 7, redirect-deliverby extension, says:
      >
      > :bytime specifies the number of seconds within which the message
      > should be delivered. :bymode specifies whether a notification should
      > be sent or the message simply returned if the time limit is exceeded.
      > The default is "return" if :bymode is not specified.  See The
      > semantics of delivery time limits are specified and discussed at
      > length in [RFC2852].
      >
      Spencer said: I'm not sure if this is a cut-and-paste error or if you
      really meant to say something that got left out, but someone smarter
      than I am needs to look at the "See The" here.
  5. Alexey Melnikov: Discuss [2010-04-21]:
        Holding DISCUSS on a part of SecDir review by Tero Kivinen:
    
    Also in section 5, it should be made clear that the "bytime" can also
    be negative, if the bymode is "notify" and the message is already
    pasts is notification time.
    
    Section 5 also says that the "bytime" is "the initial integer part of
    the
    delive-by extension", but then comments that deliver-by by-time is
    decremented
    as message passes through the transport infrastructure.
    This does not make it
    clear whether the sieve filtering system should
    also decrement the number while
    message is waiting to be processed.
    I.e. if message was received earlier, but it
    took some time before the
    sieve email filter could be run on the message, should
    the "bytime" be
    the original time from the smtp MAIL FROM BY= part, or whether
    it is
    decremented.
    (This needs to be clarified for both "envelope-deliverby" and
    "redirect-deliverby", because the answer is likely to be different for them.)
    
    Also the example in 5.1 is wrong, as it is only true if the sieve
    filter is run exactly when the deliver-by expired. It should compare
    whether the "bytime" is <= 0, not whether it is equal to 0 (note, that
    if the bymode is "return" then the "bytime" never should reach 0, as
    at that point mail is returned to the sender.
    
    In section 7 it should be made clear that ":bytime" parameter "<limit:
    number>" can be negative too, but it seems that RFC 5228 specifies
    that numbers can only be non-negative so I am not sure whether the
    usage is correct or not. 
        
  6. Alexey Melnikov: Comment [2010-04-21]:
    
        
  7. Tim Polk: Comment [2010-04-21]:
    Section 5.
    
    The first paragraph states:
    
       The "envelope-deliverby" extension does not define any new tests or
       actions, rather, it adds three values to the list of possible (case-
       insensitive) envelope-part strings defined in Section 5.4 of
       [RFC5228].
    
    but the text following the list of envelope-part strings states:
    
       All of these tests fail unconditionally if ...
    
    perhaps the following substitution would be clearer:
    
    OLD
       All of these tests fail unconditionally if the BY SMTP MAIL FROM
    parameter does not exist for the current message or recipient.
    NEW
       The
    envelope test  fails unconditionally for each of these envelope-part strings
    if the BY SMTP MAIL FROM parameter does not exist for the current message or
    recipient.
  8. Sean Turner: Comment [2010-04-22]:
    I support Alexey's DISCUSS position.

draft-ietf-pce-pcep-p2mp-extensions

  1. Stewart Bryant: Discuss [2010-04-20]:
        The text under figure 2 looks to be incorrect, the length in the IPv6 case is
    surely n*16 + 4, and not n*16 bytes. 
        
  2. Stewart Bryant: Comment [2010-04-20]:
    The following text
    ====
    
    Four values are possible for the leaf type field:
    
       1.  New leaves to add;
       2.  Old leaves to remove;
       3.  Old leaves whose path can be modified/reoptimized;
       4.  Old leaves whose path must be left unchanged.
    
    ====
    
    Is almost identical to the text two lines above, and the list entry numbers are
    I think the values, but this is not a clear way to show it.
    
    If the authors think there will ever be more than 4 operations, they should
    consider using a registry.
  3. David Harrington: Discuss [2010-04-21]:
        1) section 3.1.1 discusses advertising P2MP by setting bit 10 (TBA by IANA), but
    this request is not made in the IANA section. Later text
    
    2) cut and paste error in section 3.5 
    s/PCReq/PCResp/
    
    3) in 3.7, if a PCE ... understands the P2MP flag, but the PCE is not capable
    ..., it must send a PCErr ...". The P2MP flag can be set to mean "this is not a
    PCReq/PCRep for P2MP" (section 3.3.1). So if the PCE understands this is not a
    request for P2MP and the PCE cannot do P2MP, why is that an error?
    
    4) in 3.7, if teh PCE does not understand the P2MP flah, it is required to send
    a new error type. If, say, an existing implementation doesn't understand the
    P2MP flah because it doesn't support P2MP, why do we think it supports the new
    error type defined in the P2MP spec?
    
    5) in 3.8, is the current behavior (in implementations that have not implemented
    the P2MP spec) to reject the request?
    
    6) in 3.10, "it SHOULD be possible", does this mean "implementations SHOULD
    support the optimization functionality defined in this document"? or is
    implementation of the optimization functionality defined in this document
    REQUIRED for compliance? Can you make sure the document is clear on that point?
    
    7) throughout 3.10, the word "must" is used; shoudl this be MUST in an RFC2119
    sense?
    
    8) "To remove old leaves the user must ..." - is it possible to get an error
    because there are no leaves that can be removed? I note that error 17 value=1 is
    for "no END-POINTS with leaf type 2". I am not quite sure when that error
    occurs.
    
    9) in 3.10, "The PCC must also provide the list of old leaves and indicate if
    they should be reoptimized or not ..." What if the PCC knows that the PCE does
    not support reoptimization? Is it still required? What if the PCC doesn't care
    whether it gets reoptimized or not? Why is it required that the PCC provide
    this?
    
    10) In 3.10, what error code is returned if the PCC does NOT provide any type 3
    or type 4? Should it return an error 17 value=2, or error 17 value=3?
    
    11) in a pruning operation, what error is returned if a leaf is specified in
    both the END-POINTS type 2 and END-POINTS type 4? 
    (or type 2 and type 3)?
    
    12) in an add operation, what error is returned if a leaf specified in type 1
    already exists?
    
    13) in 3.12, "This specification also defines two new flags to the SVEC object".
    Where? I didn't find any mention of SVEC or P and D flags in the IANA section.
    The sections says it is in 6.2, but 6.2 defines the F,N,E flags in the RP
    Object.
    
    14) in 3.13.2 Response Fragmentation, a couple cut and paste errors:
    "If the
    response is too large ... the PCE will split the request ..."
    "Each message sent
    to the PCE ... to signify the response has been fragmented ..."
    
    15) in 3.13.3, I think the example text is ambiguous
    "RP2 with Req-ID1 and P2MP flag and F bit cleared."
    Does this mean the P2MP flag is cleared as well as the F bit?
    You might be clearer if you used something like:
    RP2 with ReqID=1, P2MP=1, Fbit=0.
    
    16) in 3.13.3, "To handle the scenario ... it should send an error message to
    the sender ..." What error message should it send?
    
    17) in 3.14, why is the list of unreachable destinations optional? 
    
    18) in 3.14, it is not obvious to me where this body goes inside the PCRep
    message format. This might be my lack of understanding of other standard PCEP
    objects, but PCRep is defined in 3.5. Where does the class and type associated
    with the body get specified in PCRep?
    
    19) "This object can be present in PCRep messages. There can be up to one such
    object per RP." Maybe I just haven't found this yet. Can I have more than 1 RP
    in a PCRep?
    
    20) in 4.1 "MAY be required" - I don't know what that means in terms of RFC2119
    compliance.
    Could the requirements list be made of sentences? I don't know how
    to interpret these non-sentences - both, although the first I think I can figure
    out. The second I definitely do not understand:
    
    21) "Advertisement of P2MP path computation capability enabled or disabled" -
    does this mean I must be able to enable/disable the advertisement of the
    information, or that I must advertise whether the capability is
    enabled/disabled?
    
    22) in 4.2, "MIB objects MUST be supported" - what MIB objects? Are these
    standardized? Where are they specified? Is there a reason to not include the
    relevant MIB objects in this document?
    
    23) in 4.4, how does on everify correct operation of P2MP calculation?
    
    24) in 4.5, "A new flag (value=10) could be defined ..." But this document does
    not do so, and I think this is the same flag mentioned in 3.1.1 (TBA by IANA)
    that isn't defined here.
    
    25) in 5, "... and the implementer utilize ..." - is this the operator that
    needs to utilize, or the implementer? 
        
  4. David Harrington: Comment [2010-04-21]:
    I found the document difficult to read and review.
    
    The requirements section 2 doesn't use sentences, so it is difficult to
    understand what the requirements actually are without going to the REQS
    document; if you need to do that anyway, why bother summarizing here?
    
    I expected that the summary was provided because the following text would refer
    to speciifc requirements that were being met, but it doesn't. So I am not sure
    of the value of having the summary here.
    
    The document contains quite a lot of redundancy (some from cut-and-paste
    operations). For example, the first sentences of 3.4 and 3.5 say the same thing
    in different words:
    "The PCReq message is encoded as follows ..."
    "Below is the
    message format for the request message:"
    
    The document uses inconsistent terminology. I was looking to verify the IANA
    requests, and the text in 3.1.2 describes "The TLV Type number (TBA by IANA)
    ...". In the IANA section, "TLV Type numbers" are not discussed. You need to
    look in the "P2MP Capability TLV" section, where the "PCEP TLV Type Indicators"
    registry is discussed. This type of inconsistency just makes it hardedr to read
    and understand the document.
    
    3.1.2 discusses a TLV, and then decribes the type and value; where's the label?
    
    /Note that/ is almost never needed.
    
    Purely a style issue, but in 3.3.1, I would have put the description of the
    F-bit ("The F bit is added") with the description fo the enumarted values of the
    F bit. Ditto, the N and E bits.
    
    F bit enumeration (1) "... the receiver needs to wait until it receives an RF
    with the same RP-ID and with the F bit is set to 0." Should it also wait for
    possible additional fragments until is does receive one with an f bit of 0?
    
    in 3.4, the last sentence says "must be present in this definition." In the
    definition or in messages?
    
    in 3.5, where is <end-point-pair-list> defined? I see <end-point-rro-pair-list>
    and <end-point-path-pair-list>, but not <end-point-pair-list>.
    
    in 3.7 (and elsewhere), "... computation request must then be cancelled." How
    does one cancel a P2MP request? Is there a reference?
    
    in 3.8, "if a PCC inadvertently sends a P2MP request ..." - what happens if a
    PCC maliciously and deliebrately sends a P2MP request? I think it would be
    better to reword this so it is not about the PCC, but just about the PCE. "If a
    PCE receives a P2MP request, and the PCE does not support P2MP ... extensions,
    then it should reject the request." But even better yet, shouldn't it already
    reject requests it doesn't understand? So this section shouldn't even be needed,
    right?
    
    section 3.9 discusses a reoptimization request expressing a cost-benefit
    reoptimzation threshold. But that functionality is not defined here and "may be
    addressed in a future document." Is there soemthing specific about such a
    function that MUST be discussed here to ensure that implementations do not
    preclude such a future functions? If not, then why bring it up in this document?
    Let the future document discuss this possible new function.
    
    in 3.10, there is no case 4.
    I recommend you use case#s OR figure #s, but not
    both. Having both is redundant and potentially confusing to readers.
    
    in 3.12, pleae provide a reference for SVEC.
    
    in 3.12, consistency would be nice: Diversity bit, or Diverse bit?
    
    in 3.13, s/thousands of leaves. Then/thousands of leaves, then/
    
    in multiple places s/indentify/identify/
    
    some of the text in 3.13, 3.13.1, and 3.13.2 is redundant. It might be best to
    just have it in 3.13. If you want it in 3.13.1 and 3.13.2, then you don't need
    it in 3.13.
    
    in 3.13.3 "The assumption is that ..." - would that be better as "The assumption
    used for this example is that ...". I assume that is the reason for the
    assumption; otherwise please explain why this assumption is made.
    
    in 6.1, I recommend s/P2MP Capability TLV/PCEP TLV Type Indicators/
    
    in 6.5, for some reason, the HTML bold formatting is lost. 
    In the document
    text, this is sometimes called Objects and Values rather than PCEP objects. I
    would be helpful to be consistent.
  5. Tim Polk: Discuss [2010-04-19]:
        The security considerations state:
    
       As described in [PCE-P2MP-REQ], P2MP path computation requests are
       more CPU-intensive and also use more link bandwidth.  Therefore, it
       may be more vulnerable to denial of service attacks. Therefore it is 
       more important that implementations conform to security requirements 
       of [RFC5440], and the implementer utilize those security features.
    
    I agree with this summary entirely, with one exception: my reading of the
    security considerations in 5440 indicates that these mechanisms are all
    optional with the sole exception of TCP-MD5, so "conform[ing] to the
    security requirements of [RFC5440]" isn't as productive as it sounds.
    
    I think that this section should call out the mechanisms in 5440 that are
    most important for addressing the attacks noted in the current text.  I would
    expect the new text to be brief since 5440 already provides a nice overview
    of the mechanisms. 
        
  6. Tim Polk: Comment [2010-04-19]:
    
        
  7. Dan Romascanu: Discuss [2010-04-22]:
        The DISCUSS is partially based on issues raised initially by Fred Baker in the
    OPS-DIR review.
    
    > 4.2. Information and Data Models
    
    >    As described in [PCE-P2MP-REQ], MIB objects MUST be supported for
    >    PCEP extensions specified in this document.
    
    As the existing PCEP MIB document
    (http://tools.ietf.org/html/draft-ietf-pce-
    pcep-mib-01) does not support P2PM, it was agreed by the WG at IETF77, to create
    a new PCEP MIB module specifically to support PCEP P2MP. If such a MIB document
    already existed it would be good to be included as an Informative Reference.
    Otherwise some text should be added to 4.2 on this respect. 
        
  8. Dan Romascanu: Comment [2010-04-22]:
    > 4.6. Impact on Network Operation
    
    >   It is expected that use of PCEP extensions specified in this document
    >   does not have significant impact on network operations.
    
    While the addition of PCEP-P2MP extensions may have minimal impact on the level
    of traffic and operations, the applications that are enabled by activating these
    extensions may result in increased traffic and operational complexity.
  9. Sean Turner: Discuss [2010-04-22]:
        PCEP requires use of TCP-MD5 with recognition of its failings, specifically
    mentioning that TCP-AO was not yet complete.  But as TCP-AO has now passed the
    IESG, should there be some recognition of that change?
    
    This is DISCUSS-DISCUSS (i.e, nothing for the authors to do at this time):
    
    This doc does not seem the proper place to change the PCEP recommendation, but a
    change in the MUST requirement in PCEP (RFC5440) seems to be something to
    consider somehow. 
        
  10. Sean Turner: Comment [2010-04-22]:
    I support Tim's DISCUSS position too.
    
    Some new comments based on Russ Mundy's SECDIR review:
    
    1) RFC4875 Security Considerations requires that the ingress LSR of a
       P2MP TE LSP the leaves for the P2MP LSP for use in multi-vendor
       deployments.  Although it's not clear that this document needs to
       provide this requirement, I wanted to flag the requirement in case
       that it had been overlooked.

draft-ietf-avt-register-srtp

  1. Stewart Bryant: Comment [2010-04-20]:
    I could not figure out what SRTP meant until I found it in the table of
    references at the bottom of the document, nor was it completely clear until that
    point that it was defined by RFC3711
  2. Lars Eggert: Comment [2010-04-19]:
    Section 7.1., paragraph 4:
    >    [SDESC]    IANA, "SDP Security Descriptions: SRTP Crypto Suite
    >               Registrations", December 2009, <http://www.iana.org/
    >               assignments/sdp-security-descriptions>.
    
      Not sure if an IANA URL can be a normative reference. Cite the RFC
      that created it, maybe?
  3. Adrian Farrel: Comment [2010-04-22]:
    Some minor points if you have the document open for revision...
    
    --
    
    There are two assertions in Section 1 that I would prefer to see backed
    up with references...
    
       It is desirable to extend SRTP and its keying mechanisms to support
       country-specific cryptographic transforms.
    
       existing documents require
       extensions to SRTP and extensions to SRTP keying to be published as
       Standards-Track RFCs
    
    I think Dan caught the second of these.
    
    ---
    
    Call me a pedant, but Section 2 says...
    
       This document updates Section 6 and Section 12 of [RFC3711], which
       currently require a standards track RFC to define a new SRTP
       transform.
    
    I have written many standards tracj RFCs that did not define SRTP 
    transforms. I think you mean...
    
       This document updates Section 6 and Section 12 of [RFC3711], which
       currently require a standards track RFC be used to define a new SRTP
       transform.
    
    ---
    
    Please decide whether "informaitonal RFC" and "standards track RFC" are
    capitalised or not, and then be consistent.
    
    ---
  4. David Harrington: Comment [2010-04-17]:
    section 3 - why not just eliminate this section, and move the security
    considerations section to be numbered section 3? I don't think there is any rule
    that says security consideration must follow the ian considerations section.
    
    section 4 s/transforms is/transforms are/
    s/this specifications/this specification/
  5. Russ Housley: Discuss [2010-04-22]:
        
      I think that the same approach used in CMS, TLS, and IPsec should be
      used here too.  That is, algorith specifications are published as
      Informational RFCs or published by some other standards body that can
      be referenced (such as NIST FIPS Publications).  Then, a standards
      track RFC specifies the conventions for using of the algorithm in a
      the particular security protocol.
    
      I provide two examples below for the Camellia Encryption Algorithm and
      the SEED Encryption Algorithm.  For SRTP to support these algorithms,
      I would envision a standards-track RFC being written that specifies
      the conventions for using the algorithm and makes any necessary IANA
      registry additions.  This standards-track RFC would normatively
      reference the informational RFC that is already published using the
      procedures specified in RFC 3967.
    
      CAMELLIA EXAMPLE:
    
      RFC 3713 (INFORMATIONAL): A Description of the Camellia Encryption
        Algorithm.
    
      RFC 3657 (PROPOSED STANDARD): Use of the Camellia Encryption
        Algorithm in Cryptographic Message Syntax (CMS).
    
      RFC 4132 (PROPOSED STANDARD): Addition of Camellia Cipher Suites
        to Transport Layer Security (TLS).
    
      RFC 4312 (PROPOSED STANDARD): The Camellia Cipher Algorithm and Its
        Use With IPsec.
    
      RFC 5581 (INFORMATIONAL): The Camellia Cipher in OpenPGP.
    
      SEED EXAMPLE:
    
      RFC 4009 (INFORMATIONAL): The SEED Encryption Algorithm.
        (Obsoleted by RFC4269)
    
      RFC 4269 (INFORMATIONAL): The SEED Encryption Algorithm.
    
      RFC 4010 (PROPOSED STANDARD): Use of the SEED Encryption Algorithm
        in Cryptographic Message Syntax (CMS).
    
      RFC 4162 (PROPOSED STANDARD): Addition of SEED Cipher Suites to
        Transport Layer Security (TLS).
    
      RFC 4196 (PROPOSED STANDARD): The SEED Cipher Algorithm and Its Use
        with IPsec. 
        
  6. Russ Housley: Comment [2010-04-22]:
    
        
  7. Alexey Melnikov: Comment [2010-04-13]:
    2.  Update to RFC3711
    
       This document updates Section 6 and Section 12 of [RFC3711], which
       currently require a standards track RFC to define a new SRTP
       transform.  After publication of this document, new SRTP transforms
       can be defined using either an informational or standards track RFC.
    
    I think it would be good to clarify that that means an AD sponsored
    Informational RFC. I.e. an Independent Submission via RFC Editor doesn't count.
    (I know that that is clear in the IANA Consoderations section.)
  8. Dan Romascanu: Comment [2010-04-22]:
    > However, existing documents require extensions to SRTP and extensions
       to SRTP keying to be published as Standards-Track RFCs.
    
    For clarity and consistency with the previous phrase where [RFC2026] is
    explicitely mentioned, it would be better to specify here what documents are
    referred ([RFC3711] and [RFC4568] ).
  9. Sean Turner: Discuss [2010-04-19]:
        This is a discuss-discuss (i.e., nothing for the authors to do - at this time): 
    
    Doesn't RFC 3967 | BCP 97 explain how standards track documents can normatively
    point to (i.e., use) informational track documents?  In other words, I'm not
    entirely sure why this ID is needed at all because I think the text in RFC 3967
    | BCP 97 trumps whatever text is in RFC 3711.  If the WG wants to allow
    SRTP/SCRTP to use an informational track algorithm RFC, then the WG publishes an
    RFC that says STRP can use said informational RFC, calls out this DOWNREF in a
    WG LC (and possibly again in an IETF LC), and they're done.  Is there some other
    background I'm missing? 
        
  10. Sean Turner: Comment [2010-04-19]:
    I'd really like to see the set of OLD/NEW text for the sentences that you want
    changed.  It's pretty clear in section 6 what you want to change, but I don't
    see where there's a MUST in section 12 for algorithm documents to be standards
    track.

draft-ietf-mip4-rfc3344bis

  1. Jari Arkko: Comment [2010-03-11]:
    
        
  2. Adrian Farrel: Comment [2010-04-15]:
    Jari tells me that the Erratum has now been rejected based on WG consensus. I
    will clear my Discuss.
  3. Russ Housley: Comment [2010-03-08]:
      The Gen-ART Review by Miguel Garcia on 2010-03-08 raised a few
      editorial issues.  Please consider them.  I would really like to
      see the comments about Appendix G addressed, so it is repeated
      here for convenience:
    
      - The structure of Appendix G is a bit confusing. Section G.1 lists
        the changes made since RFC 3344. Sections G.2 and G.3 list the Major
        and Minor Changes, respectively, but it is not clear to me if these
        are changes since RFC 3344 or they include earlier changes as well.
        To add more confusion, Section G4 lists the changes since RFC 3344,
        but wasn't this what Section G.1 is all about?
  4. Sean Turner: Comment [2010-04-21]:
    Two comments:
    
    1) Sec 1.6: It's a little ODD that there's a requirement in the terminology
    section (see SPI paragraph).  Can this be moved to somewhere else in the
    document?
    
    2) Sec 1.9: r/it is recommended that new Mobile IP extensions follow one of the
    two new extension/it is RECOMMENDED that new Mobile IP extensions follow one of
    the two new extension   ?

draft-nottingham-http-link-header

  1. Jari Arkko: Comment [2010-04-22]:
    
        
  2. Lars Eggert: Comment [2010-04-20]:
    [TBD]@ietf.org and [TBD-2]@ietf.org mailing lists need to be created
    and an RFC Editor Note needs to ask them to substitute the final names.
  3. Tim Polk: Discuss [2010-04-19]:
        This is a discuss-discuss.  To be clear, I am not asking for any change in the
    document at this
    time.
    
    Is there any precedent for the following text?:
    
       Within at most 14 days of the request, the Designated Expert(s) will
       either approve or deny the registration request, communicating this
       decision to the review list.  Denials should include an explanation
       and, if applicable, suggestions as to how to make the request
       successful.  Registration requests that are undetermined for a period
       longer than 21 days can be brought to the IESG's attention (using the
       iesg@iesg.org mailing list) for resolution.
    
    It sounds like the IESG could be fielding a lot of registration requests. 
        
  4. Tim Polk: Comment [2010-04-19]:
    
        
  5. Peter Saint-Andre: Discuss [2010-04-20]:
        The reference for the "hub" relation type in the initial registration is
    "<http://pubsubhubbub.googlecode.com/>", however referencing a website does not
    appear to be consistent with "Specification Required" as mentioned in Section
    6.2.1 and defined in RFC 5226. For consistency, it would be best for the person
    who requested this relation type to submit a brief Internet-Draft defining the
    relation, and for the initial registry contents to exclude the "hub" relation
    type pending submission of that Internet-Draft. 
        
  6. Peter Saint-Andre: Comment [2010-04-20]:
    I concur with Tim Polk's concern regarding increased load on the IESG resulting
    from the (seemingly novel) 14-day rule for review of registration requests.
  7. Robert Sparks: Discuss [2010-04-20]:
        Should there be additional guidance to the expert reviewer on what to check for
    in the specification required by "Specification Required"? Is it sufficient for
    registration to have a document that contains only the template, or is that
    document expected to have more semantic content?
    
    The answer to that may affect "first", "last", and "payment" in this document.
    
    In either case, "hub" needs a more stable reference than googlecode. 
        
  8. Robert Sparks: Comment [2010-04-20]:
    
        
  9. Sean Turner: Comment [2010-04-19]:
    
      

draft-reschke-rfc2231-in-http

  1. Adrian Farrel: Discuss [2010-04-22]:
        
    A fine document, but there are three small things I don't understand...
    
    Why isn't RFC 2231 a normative reference?
    
    Why does the text say...
       RFC 2231 (Appendix of [RFC2231]) defines an
       escaping mechanism for use in MIME headers. 
    ...I can't find an Appendix in RFC 2231.
    
    RFC 2231 doesn't actually use the term "escape" or "escaling". It might be nice
    to harmonise on the terms used by theat RFC. 
        
  2. Adrian Farrel: Comment [2010-04-22]:
    
        
  3. Russ Housley: Comment [2010-04-22]:
      In section 3.2:
      >
      > Producers MUST NOT use character sets other than "UTF-8" ([RFC3629])
      > or "ISO-8859-1" ([ISO-8859-1]).
      >
      Better to say:
      >
      > Producers MUST use either the "UTF-8" ([RFC3629]) or the
      > "ISO-8859-1" ([ISO-8859-1]) character set.
  4. Tim Polk: Comment [2010-04-19]:
    In section 3.2:
    
       Producers MUST NOT use character sets other than "UTF-8" ([RFC3629])
       or "ISO-8859-1" ([ISO-8859-1]).  Extension character sets (ext-
       charset) are reserved for future use.
    
    ext-charset does not appear in the ABNF.  Should it?
  5. Peter Saint-Andre: Comment [2010-04-19]:
    In Section 3.2, there appears to be confusion between the terms "mime-charset"
    and "ext-charset".
    
    Section 4.1 of this I-D states:
    
       Section 4.2 of [RFC2277] requires that protocol elements containing
       text are able to carry language information.  Thus, the ext-value
       production should always be used when the parameter value is of
       textual nature and its language is known.
    
    In fact RFC 2277 states that "[a]ll human-readable text has a language" and
    appears to emphasize human-readable text. Although it's not truly clear if RFC
    2277 makes a distinction between "text" and "human-readable text", it might be
    useful to incorporate that distinction here because many textual strings
    included in protocol elements are not intended for human consumption.
  6. Sean Turner: Comment [2010-04-18]:
    Sec 3.3, Is the link to the WG ticket stable enough for a standards track
    document?
    
    Sec 4.1, r/should/SHOULD X2
    
    Sec 4.2, r/recommended/RECOMMENDED

draft-turner-asymmetrickeyformat

  1. Lars Eggert: Comment [2010-04-19]:
    
        
  2. Russ Housley: Discuss [2010-04-21]:
          I tried to compile the ASN.1 and got errors.  First, 'Attribute' is
      being imported from module 'PKIX-CommonTypes-2009' but is not
      exported by module 'PKIX-CommonTypes-2009'.  Second, this line
      contains a syntax error:
    
       Version ::= INTEGER {v1(0), v2(1)} (v1, ..., v2, ...) 
        
  3. Russ Housley: Comment [2010-04-21]:
      Please consider the media-subtype-related comment from the Gen-ART
      Review by Roni Even:
    
      In section 7 what you are registering is a media subtype and not a
      media type. The media type is application. So "defines a new media
      type" should be "defines a new media subtype" and "Registration of
      media type" should be "Registration of media subtype".
  4. Alexey Melnikov: Comment [2010-04-22]:
    
        
  5. Peter Saint-Andre: Discuss [2010-04-19]:
        I second Alexey's discuss. 
        
  6. Peter Saint-Andre: Comment [2010-04-19]:
    
      

draft-turner-asymmetrickeyformat-algs

  1. Alexey Melnikov: Comment [2010-04-14]:
    
        
  2. Peter Saint-Andre: Discuss [2010-04-19]:
        I second Alexey's discuss. 
        
  3. Peter Saint-Andre: Comment [2010-04-19]:
    
      

draft-haberman-rpsl-reachable-test

  1. Jari Arkko: Discuss [2010-04-22]:
        I like this document and idea, and I fully support it going forward.
    For what it is worth, I do not believe the document needs to be any
    clearer with respect to the security implications or what protocols
    are being offered for test. However, I did have one practical concern:
    
       The presence of one or more pingable attributes signals to network
       operators that the maintainer of the referenced network is providing
       the address(es) for external diagnostic testing.  Tests involving the
       advertised address(es) SHOULD be rate limited to no more than ten
       probes in a five minute window unless prior arrangements are made
       with the maintainer of the attribute.
    
    I think this is overly cautious, and could perhaps apply to some
    automatic probing by everyone. But written as above, I would not be
    able to launch a regular ping with default options to towards the
    site, unless I aborted it within ten seconds. And even then, that would
    be it for that five minute period.
    
    I would suggest that the text explictly calls out a conservative
    limit (e.g., the above one) on any automatic probing, while allowing
    manual testing without any hard limits. The text could perhaps say
    something about normal courtesy in tests, such as alerting the
    destination before any resource consuming tests are done (flood pings
    and the like) 
        
  2. Jari Arkko: Comment [2010-04-22]:
    
        
  3. Gonzalo Camarillo: Comment [2010-04-22]:
    The acronym RPSL should be expanded in the Title.
  4. David Harrington: Comment [2010-04-17]:
    section 2: "can advertise" - should this be a MAY or SHOULD?
    section 3:
    "maintaner of the attribute" - would this be better stated as "operator fo the
    target network"?
  5. Russ Housley: Discuss [2010-04-21]:
        
      The Gen-ART Review by Vijay Gurbani raised a point that deserves
      a response:
    
      Is the intent to have the specific IP address be used solely for
      diagnostic tests?  That is, can someone probe for other services on
      this IP address (http, sip, etc.)?  The description is not very clear
      on that, and in fact, if the intent is for the latter to happen, then
      some manner of Security Consideration section should be put in to
      alert of any ramifications. 
        
  6. Russ Housley: Comment [2010-04-21]:
    
        
  7. Tim Polk: Discuss [2010-04-22]:
        +1 Sean's and Peter's discuss...
    
    The missing security considerations section should address any controls that are
    needed
    on intermediate systems (e.g., gateways, routers or firewalls) as well as
    the advertised
    reachable host. 
        
  8. Tim Polk: Comment [2010-04-22]:
    
        
  9. Peter Saint-Andre: Discuss [2010-04-19]:
        The document lacks the required security considerations section.
    
    From an operational perspective, the NIC Handle system is no longer supported as
    widely as it once was; therefore inclusion of the <nic-handle> does not
    necessarily or even reliably "provide a link to contact information" as claimed
    in the specification. Is there a reason why the "ping-hdl" attribute does not
    have a value-type of <email-address> (as for the "notify" attribute in RFCs 2622
    and 4012)? 
        
  10. Peter Saint-Andre: Comment [2010-04-19]:
    Please demarcate the rows of the table in Section 2 -- it is confusing to read.
    
    There are no references for the value-types <ipv6-address> and <ipv4-address>,
    which are apparently meant to be definitional for the "pingable" attribute;
    these are defined in RFC 4012 and RFC 2622 respectively but references would be
    helpful. Similarly there is no reference for the value-type <nic-handle>, which
    is apparently meant to be definitional for the "ping-hdl" attribute; this is
    defined in RFC 2622 but a reference would be helpful.
  11. Sean Turner: Discuss [2010-04-17]:
        This ID needs a security considerations section.  This section is required as
    per (http://www.ietf.org/id-info/checklist.html) and noted in the nits checker. 
        
  12. Sean Turner: Comment [2010-04-17]:
    
      

draft-ietf-nsis-nslp-natfw

  1. Dan Romascanu: Discuss [2010-04-22]:
        This document is defined as Experimental but there is nothing inside that
    describes the criteria of the experiment and the limitations in deployment which
    have been subject of extensive discussion. I believe that we need to include a
    reference to draft-ietf-nsis-ext-07.txt and text that points to that I-D for the
    status of the document and deployment limitations. 
        
  2. Dan Romascanu: Comment [2010-04-22]:
    
      

draft-ietf-nsis-rmd

  1. Russ Housley: Comment [2010-04-21]:
      The promises in the IPR Statement apply only if this document is
      published on the standards track, which is not happening at this
      time.
  2. Dan Romascanu: Discuss [2010-04-22]:
        This document is defined as Experimental but there is nothing inside that
    describes the criteria of the experiment and the limitations in deployment which
    have been subject of extensive discussion. I believe that we need to include a
    reference to draft-ietf-nsis-ext-07.txt and text that points to that I-D for the
    status of the document and deployment limitations. 
        
  3. Dan Romascanu: Comment [2010-04-22]:
    Should not the title reflect the fact that we deal with an NSIS QoS Model? for
    example by adding (using NSIS) or saying NSIS QoS Model.
  4. Sean Turner: Discuss [2010-04-22]:
        This is DISCUSS placeholder.
    
    The SECDIR review included a number suggestions for the security considerations
    section.  The authors noted that the suggestions were useful, but due to the
    cloud computing disaster in Iceland their travel plans have been disrupted
    resulting in them not being able to address the comments until after the May 6th
    telechat. 
        
  5. Sean Turner: Comment [2010-04-22]:
    
      

draft-ietf-nsis-ext

  1. Robert Sparks: Discuss [2010-04-20]:
        The descriptions of the various allocation policies in ietf-nsis-ntlp don't seem
    to match what's in the actual document. Most of those break the values into
    ranges with policies of "standards action", "expert review", "private
    experimental use", and "reserved". The corresponding descriptions in this
    document say "IETF review of a specification" or "expert review". In the section
    on Object Type ID, this document says "IETF review of a specification or through
    another acceptable published specification", which doesn't match what's in nsis-
    ntlp-20. 
        
  2. Robert Sparks: Comment [2010-04-20]:
    
      

draft-ietf-radext-status-server

  1. Jari Arkko: Comment [2010-04-22]:
    The document says:
    
       The "hop by hop" functionality of Status-Server packets is useful to
       RADIUS clients attempting to determine the status of elements on the
       path between the client and a server. 
    
    This should read: ... determine the status of the first element on the
    path between ... (because you are not forwarding from the proxy and there
    are no security associations from a client to proxies beyond the first
    one, there is no way to test proxies 2 and onwards)
    
    The document notes on the discussion of codes and port numbers:
    
       However, as the category of [RFC2866] is Informational, this conflict
       is acceptable.
    
    This is merely a statement about the status of various RFCs. Personally,
    the substantive change is that this new RFC would allow a new code
    to be used on port 1813. I think it should do an "Updates: RFC 2866"
    and get it over with.
  2. Lars Eggert: Discuss [2010-04-19]:
        
    Section 4.1., paragraph 2:
    >    The client SHOULD also have a configurable global timer (Tw) that is
    >    used when sending periodic Status-Server queries during server fail-
    >    over.  The default value SHOULD be 30 seconds, and the value MUST NOT
    >    be permitted to be set below 6 seconds.  If a response has not been
    >    received within the timeout period, the Status-Server packet is
    >    deemed to have received no corresponding Response packet, and MUST be
    >    discarded.
    
      DISCUSS: I would like to discuss two issues with this design. First,
      since it is only RECOMMENDED to implement Tw and not REQUIRED, clients
      need not do so. How do clients without Tw decide that a server has not
      responded?
    
      Second, there is no discussion on what rate clients should
      be using when *issuing* Status-Server queries. The current text allows
      a client to send Status-Server queries to the server at high rates,
      and does not require the client to reduce its sending rate when it
      receives no responses. In other words, there currently isn't any sort
      of congestion control. Has this been discussed by the working group?
      It seems like all the pieces are already there to implement a simple
      congestion control scheme: have clients issue at most one request per
      Tw (already implied by Section 4.3 text but not clearly stated
      anywhere), double Tw up to some conservative maximum when the server
      does not respond, restore the initial Tw when it does (Section 4.3
      again has some text that goes into that direction). 
        
  3. Lars Eggert: Comment [2010-04-19]:
    Section 1812., paragraph 4:
    
    >    The server MAY prioritize the handling of Status-Server packets over
    >    the handling of other requests, subject to the rate limiting
    >    described above.
    
      Without congestion control, implementing this MAY guarantees that the
      minimum amount of useful (= non-Status-Server) work will be done.
    
    Section 4.3., paragraph 3:
    >    If no response is received to Status-Server packets, the RADIUS
    >    client can initiate failover to another proxy.  By continuing to send
    >    Status-Server packets to the original proxy at an interval of Tw, the
    >    RADIUS client can determine when the original proxy becomes
    >    responsive again.
    
      This uses Status-Server messages as an overload detection mechanism.
      They need to be sent in a way that will back off the rate
      under overload, because otherwise the scheme can turn into an
      overload *generation* mechanism.
    
    Section 4.5., paragraph 17:
    >    It is RECOMMENDED, therefore, that implementations desiring the most
    >    benefit from Status-Server also implement server failover.  The
    >    combination of these two practices will maximize network reliability
    >    and stability.
    
      If Status-Server messages are being sent in a way that is congestion
      controlled (i.e., the rate is reduced under overload).
  4. Russ Housley: Comment [2010-04-21]:
      Please consider the comments from the Gen-ART Review by Francis Dupont:
    
      - Abstract page 2: there is an explicit reference to a RFC, this is in
      general forbidden but IMHO we are here in the allowed exception case.
    
      - 2.1.1 page 8: a servers policy -> a server policy
    
      - 3 page 10 (twice): etc. -> etc., ???
    
      - 4.2 page 13: adminstrators -> administrators
    
      - 4.2 page 15 (twice): e.g. -> e.g.,
    
      - 4.3 page 16: modelled -> modeled
    
      - 4.3 page 16: usually the hysteresis against flapping tries to keep
      the connection (i.e., failover after 3 missed responses), here it is
      the opposite. IMHO it is very aggressive but it is how RFC 3539 works
      so I have no concern about it.
    
      - 4.5 page 16: Proxyhas -> Proxy has
    
      - 4.5 page 17: cannot, -> cannot
    
      - 4.5 page 18: i.e. -> i.e.,
    
      - 5 page 19: EAP-MEssage -> EAP-Message
    
      - 8 page 23: synthesise -> synthesize
    
      - 8 page 23: in "the suggestion of [RFC5080] Section 2.2.2, which suggests"
      suggests -> proposes
    
      - 8 page 23: configurably is not in my dict?
    
      - 9.2 page 23: IMHO the RFC2119 reference should be moved to normative
      references section (perhaps others too?)
    
      - Authors' Addresses -> Author's Address
  5. Tim Polk: Comment [2010-04-22]:
    I support Lars' and Peter's discuss positions.
  6. Peter Saint-Andre: Discuss [2010-04-20]:
        Is the use of MD5 in generating the Response Authenticator subject to collision
    attacks? If not, it would be helpful to describe why not, and provide a
    reference to RFC 4270. If so, then the security considerations need to be
    updated. 
        
  7. Peter Saint-Andre: Comment [2010-04-20]:
    Given that the Request Authenticator should be unpredictable and unique, a
    reference to RFC 4086 would be appropriate.
    
    Please add a reference to RFC 1321 for the definition of MD5.
  8. Robert Sparks: Comment [2010-04-22]:
    Support Lars' discuss re: limiting message rates
    
    If there is a reason to perform a major edit on this document, please consider
    splitting the "documenting what was deployed" and "recommending fixes" into
    clearly separate sections (if not documents).
  9. Sean Turner: Comment [2010-04-21]:
    I support Peter's discuss.  
    
    Additionally, I noted the same thing Peter did wrt to random numbers.
    
    Section 3: In the Request Authenticator description the two paragraphs repeat
    that Request Authentication SHOULD be unpredictable and then says why. Maybe the
    second paragraph should be tweaked:
    
     The Request Authenticator value in a Status-Server packet
     SHOULD also be unpredictable **because** an attacker **could**
     trick a server
     into responding to a predicted future request, and then use the
     response to masquerade as that server to a future Status-Server
     request from a client.

draft-wallace-using-ta-constraints

  1. Alexey Melnikov: Discuss [2010-04-17]:
        DISCUSS DISCUSS: I would like to understand the scope (applicability statement)
    for this document and also why it is Informational (as opposed to PS).
    
    7.2.  Informative References
    
       [I-D.draft-ietf-pkix-ta-format]
                  Housley, R., Wallace, C., and S. Ashmore, "Trust Anchor
                  Format", draft-ietf-pkix-ta-format (work in progress).
    
    I think this reference is Normative, considering that the document is using some
    ASN.1 structures defined in it. 
        
  2. Alexey Melnikov: Comment [2010-04-17]:
    
        
  3. Peter Saint-Andre: Discuss [2010-04-19]:
        I concur with the DISCUSSes lodged by Alexey Melnikov.
    
    In addition, the security considerations do not document what attacks are made
    possible if implementations do not enforce trust anchor constraints and if trust
    anchor information is not securely stored. The authors might refer to RFC 3552
    in drafting appropriate text. 
        
  4. Peter Saint-Andre: Comment [2010-04-19]:
    
        
  5. Sean Turner: Comment [2010-04-22]:
    I support Alexey's DISCUSS position.  I think this ought to be standards track.

draft-simpson-tcpct

  1. David Harrington: Comment [2010-04-21]:
    I support the IESG Writeup