On Fri, 16 Feb 2007, Andrew Sullivan wrote:

> On Wed, Feb 14, 2007 at 10:52:45PM -0500, Dean Anderson wrote:
> 
> > I asked this before and got no answer. RFC2119 itself gives some
> > guidance:
> 
> I don't think that's exactly true.  I pointed out that, as far as I
> know, this document is intended to be an informational document, which
> means that it will not specify any standards.  

While this fact is true, this fact isn't relevant to the question posed.

On January 8, 2007, I posted a list of examples of published
informational RFCs that include this language. That demonstrates that
RFC2119 language is allowed in informational RFC's.

> I asked for advice (or dissent) from our colleagues on this list, and
> received nothing, so I assume that others agree.  The relevant bits of
> [RFC2119] are ones you actually quote:

Silence is agreement? Perhaps silence means they agree with me.  I take
silence to mean that no one claims to know the authoritative answer.  
But the chairs did not respond, and it was their guidance I was
expecting.

> > "6. Guidance in the use of these Imperatives
> > 
> >    "Imperatives of the type defined in this memo must be used with care
> >    and sparingly.  In particular, they MUST only be used where it is
> >    actually required for interoperation or to limit behavior which has
> >    potential for causing harm (e.g., limiting retransmisssions)  For
> 
> 
> > My purpose in using these terms is to limit behavior which has the
> > potential for causing harm.  
> 
> So far as I can see, you haven't demonstrated that the "harm" you are
> talking about is the same as the "harm" that 2119 is talking about.

Security vulnerabilities are included as harms that 2119 is talking
about. You haven't refuted the statements I proposed putting in the
Security Considerations section.  I suggest you also review the thread
entitled "Tangible harm caused by in-addr-required ". Rather than repeat
that thread in its entirety, I think this comment by Kevin Darcy is
still quite pertinent:

At 10:01 PM 9/12/01, Kevin Darcy wrote:
>I oppose adoption/advancement of the draft. Not only are the security
>justifications null and void, I think they actually *detract* from the
>other justifications inasmuch as they promote/encourage bad security
>practices and/or risk creating a False Sense of Security.



> That is, you might think it a foolish thing to draw any conclusions
> from reverse tree data; that does not mean that others, with different
> experiences or situations, would in their cases reach the same
> conclusion.  

Indeed, logic does mean that other rational persons would reach the same
logical conclusions.  Mathematical logic doesn't change due to
experience or situation which are irrelevant to the assertions. The only
relevant issue here is that Administrator A has no authority over Site
B, and that doesn't change due to the experience or situation of
Administrator A.

This is exactly the distinction between rational and irrational. Others,
as I have recited, have proved that such conclusions aren't logically
grounded.  There are no experiences or situations where security
conclusions can be logically drawn from the reverse mapping of another
site.

You haven't proved such conclusions are logically grounded in any
situation involving other sites. You haven't cited any flaws in the
logic.  Your defense is to assert that one is _entitled_ to act
irrationally.  One may be entitled, as a free person, to act
irrationally, but one is not entitled to describe irrational acts as
being rational in a professional document.  Doing so makes the document
a fiction--a charade rather than truth.

> I believe the draft allows both cases to be considered.

Every case can be considered. However, the irrational cases have to be
described as being irrational, using terms that would imply or
specifically state the irrationality. You describe them as rational,
which is misleading and confusing.  

I think your choice is to either drop them altogether (as Ed Lewis
suggested in 2003), or describe them accurately as being irrational and
unjustified by any facts or logic.  I think history has shown you will
willfully refuse to do either of these alternatives.  Including
misleading descriptions will lead to well-justified objections.  Of
course, the third option is to drop the draft in favor of another draft.
I support that approach, and will shortly be submitting an alternate
document for consideration.


                --Dean



-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   










_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to