Thanks for the review, Jouni!

I see that the newer versions have corrected at least some of the issues 
discussed here; didn’t check all but it seems fine enough now for me to ballot 
no-objection. Which I have done.

Jari

On 19 Aug 2016, at 19:19, Jouni Korhonen <jouni.nos...@gmail.com> wrote:

> David,
> 
> 8/15/2016, 7:01 AM, Black, David kirjoitti:
>> Hi Jouni,
>> 
>> Three quick responses:
>> 
>> IPv6 NATs - Ah, now I see the concern.  We'll rewrite the middlebox material 
>> on IPv6 zero checksums to avoid using NATs as examples.
>> 
>> The "MUST" for the "MAY" requirement in RFC 6936 (#9) doesn't do anything 
>> aside from telling people to go read that requirement in the context of the 
>> rest of RFC 6936, which seems useful.
>> 
>>>>> o In Section 8 and lines 784-785 has a “MUST NOT” for traffic that is not 
>>>>> known to be
>>>>>  congestion-controlled.. I would be interested in knowing how to enforce 
>>>>> this “MUST”
>>>>>  specifically in the Internet case.
>>>> 
>>>> In contrast, this is effectively a rhetorical question - there is no 
>>>> plausible
>>> protocol mechanism to enforce this, as a Congestion-Controlled header flag 
>>> is
>>> about as realistic as the Evil header flag
>> [... snip ...]
>>> Ok. Knowing this MUST has no meaning is real world I would then consider not
>>> having the MUST here.. that would be a waste of precious capital letters ;)
>> 
>> That's not quite right.  There are no protocol means to enforce this, but it 
>> does clearly tell an operator not to do this, which does have meaning in the 
>> real world ;-).
> 
> I kind of agree on that. However, in that case I would reword the use of MUST 
> differently. Since there is no "protocol way" etc to enforce the MUST I would 
> reword text here more clearly as a deployment guidance. Something along lines 
> "a deployment using a default GRE-in-UDP tunnel MUST take any precautions not 
> to forward traffic that is not known to be congestion controlled into the 
> GRE-in-UDP tunnel". Clumsy English but something to that direction..
> 
> - Jouni
> 
> 
>> 
>> Please be patient with us - I'm trying to take vacation this week and have a 
>> bunch of drafts that need attention "in the queue" ahead of this one, so it 
>> may take a couple of weeks to do the editing and post a new version.
>> 
>> Thanks, --David
>> 
>>> -----Original Message-----
>>> From: Jouni [mailto:jouni.nos...@gmail.com]
>>> Sent: Sunday, August 14, 2016 8:49 PM
>>> To: Black, David
>>> Cc: gen-art@ietf.org (gen-art@ietf.org); draft-ietf-tsvwg-gre-in-udp-
>>> encap....@ietf.org
>>> Subject: Re: Generate review of draft-ietf-tsvwg-gre-in-udp-encap-16
>>> 
>>> Hi David,
>>> 
>>> See inline.
>>> 
>>> 
>>>> On 12 Aug 2016, at 12:25, Black, David <david.bl...@emc.com> wrote:
>>>> 
>>>> Hi Jouni,
>>>> 
>>>> Thanks for the review.  I have a few comments as draft shepherd (anything 
>>>> that
>>> I don't comment on below is editorial and will likely just be fixed in the 
>>> next
>>> version):
>>>> 
>>>>>  - It repeats.. the same statements multiple times.
>>>> 
>>>> If you have specific examples of repeated statements that caught your eye,
>>> please let us know.  Otherwise, the response will be "Thank you for your 
>>> input" ;-
>>> ).
>>> 
>>> 
>>> Stuff like this..
>>> 
>>> 1. Introduction:
>>> 
>>>  "This document specifies a generic GRE-in-UDP encapsulation for..”
>>>  ..
>>>  "This document specifies GRE-in-UDP tunnel requirements for two..”
>>>  ..
>>> 
>>> 2. Applicability Statement
>>> 
>>>  "This document specifies GRE-in-UDP tunnel usage in the general..”
>>> 
>>> It is mostly about the writing style - so very subjective. Specifically in 
>>> the Intro
>>> could be condensed into fewer fewer paragraphs. It is more like I’d like to 
>>> see
>>> what this document specifies in one place and not reading multiple 
>>> paragraphs
>>> saying again “this document specifies..”.
>>> 
>>>> 
>>>>>  - When reading the document I get the feeling it is actually two 
>>>>> documents. The
>>>>>    technical specification (which is very short) and the general 
>>>>> deployment
>>>>>    considerations document. I would have split it to two but that is just 
>>>>> me.
>>>> 
>>>> Well, that suggests that something important is missing.
>>>> 
>>>> As specified in full generality, the GRE-in-UDP protocol is not safe for 
>>>> general
>>> deployment in the public Internet.  Therefore, two different applicability
>>> scenarios are specified in Section 2:
>>>>    - Default: Restrict the protocol implementation and usage to that which 
>>>> is
>>> safe for general deployment in the public Internet.
>>>>    - Traffic Managed Controlled Environment (TMCE): Restrict the nature of
>>> the network so that the general protocol is safe to deploy.
>>>> This is why the two specifications have to go together - the protocol spec 
>>>> by
>>> itself is not safe to deploy in the public Internet, and hence needs the
>>> deployment material.  In 20/20 hindsight, I think this should have been 
>>> explained
>>> at the start of Section 2 (there is  a brief mention of this in the 
>>> Introduction, but
>>> that's clearly not sufficient to convey the point).
>>>> 
>>>> We'll revise the draft accordingly, including ...
>>> 
>>> Thanks.
>>> 
>>>> 
>>>>> o On line 129 is says:
>>>>>      This document specifies GRE-in-UDP tunnel requirements for two
>>>>>  Based on the earlier text I would suggest saying “..document also 
>>>>> specifies..”
>>>> 
>>>> That's the brief mention of the same applicability topic in the 
>>>> introduction.
>>> While "also" is definitely the wrong word to use in this context, we'll 
>>> look into
>>> rephrasing that sentence to make it clearer.
>>> 
>>> Ok. Thanks.
>>> 
>>>> 
>>>>> o In Section 7.1 I find it a bit odd discussing NATs in the specific 
>>>>> context of IPv6. If
>>>>>  you have a specific IPv6 NAT scenario in mind either spell it out or 
>>>>> give a reference
>>>>>  to a specification that describes the technology/use case.
>>>> 
>>>> Section 7.1 is not about NATs in general - it's about middlebox 
>>>> interactions with
>>> UDP zero checksums for IPv6.   This discussion is necessitated by RFC 6936's
>>> discussion of middleboxes, and needs to remain in about its current form 
>>> for that
>>> reason.
>>> 
>>> I mean the following here. Section 7.1 starts off:
>>> 
>>>  "IPv6 datagrams with a zero UDP..”
>>> 
>>> Then few lines later:
>>> 
>>>  "updates the UDP checksum field, such as NATs or firewalls."
>>> 
>>> I get really itchy bringing NAT even into examples in IPv6 context. We do 
>>> have
>>> RFC6296 NPTv6, which is checksum neutral. If there are other IPv6 NAT 
>>> thingies in
>>> mind here, I would be explicit or just leave the NAT out.
>>> 
>>>> 
>>>>> o On line 654 is says:
>>>>>           MUST comply with requirement 1 and 8-10 in Section 5 of RFC 6936
>>>>>  How is this “MUST” enforced?
>>>> 
>>>> The same as any other "MUST" in this draft - those four are implementation
>>> requirements for GRE-in-UDP implementations - the requirements have been
>>> referenced instead of copied.
>>> 
>>> Ok. It seem I misunderstood this slightly wrong. I was more thinking 
>>> middleboxes
>>> on path that are not my implementations and how to enforce the MUST on those
>>> e.g., cases where there is a middlebox that does not obey the MUST but still
>>> seems to work ok.
>>> 
>>> One more question. How do I MUST a MAY requirement (RFC6936 Section 5 req.
>>> #9)?
>>> 
>>>> 
>>>>> o In Section 8 and lines 784-785 has a “MUST NOT” for traffic that is not 
>>>>> known to be
>>>>>  congestion-controlled.. I would be interested in knowing how to enforce 
>>>>> this “MUST”
>>>>>  specifically in the Internet case.
>>>> 
>>>> In contrast, this is effectively a rhetorical question - there is no 
>>>> plausible
>>> protocol mechanism to enforce this, as a Congestion-Controlled header flag 
>>> is
>>> about as realistic as the Evil header flag - see RFC 3514, taking notion of 
>>> its
>>> publication date.   Hmm ... is this C-C header flag a candidate for next 
>>> April ;-) ??
>>> Applicability restrictions on deployment/usage are generally not 
>>> enforceable via
>>> technical means - all we can say is that a deployment that does not comply 
>>> with
>>> the applicability restrictions is not compliant with the RFC.
>>> 
>>> Ok. Knowing this MUST has no meaning is real world I would then consider not
>>> having the MUST here.. that would be a waste of precious capital letters ;)
>>> Seriously, if one cannot control it or even know whether some traffic is
>>> congestion controlled beyond a generic assumption state in previous 
>>> sentence I
>>> see no need for RFC2119 language here.
>>> 
>>> Thanks,
>>>     Jouni
>>> 
>>> 
>>>> 
>>>> Thanks, --David
>>>> 
>>>>> -----Original Message-----
>>>>> From: Jouni [mailto:jouni.nos...@gmail.com]
>>>>> Sent: Friday, August 12, 2016 2:51 AM
>>>>> To: gen-art@ietf.org (gen-art@ietf.org); draft-ietf-tsvwg-gre-in-udp-
>>>>> encap....@ietf.org
>>>>> Subject: Generate review of draft-ietf-tsvwg-gre-in-udp-encap-16
>>>>> 
>>>>> I am the assigned Gen-ART reviewer for this draft. The General Area
>>>>> Review Team (Gen-ART) reviews all IETF documents being processed
>>>>> by the IESG for the IETF Chair.  Please treat these comments just
>>>>> like any other last call comments.
>>>>> 
>>>>> For more information, please see the FAQ at
>>>>> 
>>>>> <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.
>>>>> 
>>>>> Document: draft-ietf-tsvwg-gre-in-udp-encap-16
>>>>> Reviewer: Jouni Korhonen
>>>>> Review Date: 8/11/2016
>>>>> IETF LC End Date: 2016-08-12
>>>>> IESG Telechat date: (if known)
>>>>> 
>>>>> Summary:  Ready with minor nits.
>>>>> 
>>>>> Major issues: None.
>>>>> 
>>>>> Minor issues: Read on..
>>>>> 
>>>>> Editorials/nits:
>>>>> o My “complaint” of this document is basically on the following.. these 
>>>>> are
>>>>> writing
>>>>>  style things so feel free to neglect:
>>>>>  - It repeats.. the same statements multiple times.
>>>>>  - When reading the document I get the feeling it is actually two 
>>>>> documents.
>>> The
>>>>>    technical specification (which is very short) and the general 
>>>>> deployment
>>>>>    considerations document. I would have split it to two but that is just 
>>>>> me.
>>>>> 
>>>>> The other nits.
>>>>> 
>>>>> o There are bunch of acronyms that are not expanded either never or on 
>>>>> their
>>> first use.
>>>>>  Some examples include UDP, DSCP, DS, PMTU, MPLS, VNP, .. Pay attention
>>> to these.
>>>>> o In the Introduction give a reference to EtherType e.g., the repository 
>>>>> where
>>> they
>>>>>  are maintained or by whom they are maintained.
>>>>> o On line 129 is says:
>>>>>      This document specifies GRE-in-UDP tunnel requirements for two
>>>>>  Based on the earlier text I would suggest saying “..document also 
>>>>> specifies..”
>>>>> o On line 143 I would also (following the previous style in the paragraph)
>>> capitalize
>>>>>  “wide area networks” as well.
>>>>> o In multiple places (lines 236, 887) the reference is after the full 
>>>>> stop. Place
>>> full
>>>>>  stop after the reference.
>>>>> o The document uses both tunnel ingress/egress and
>>>>> encapsulator/decapsulator. Is there a
>>>>>  specific reason to have this differentiation? If not use common 
>>>>> terminology
>>> throughout
>>>>>  the document.
>>>>> o On line 654 is says:
>>>>>           MUST comply with requirement 1 and 8-10 in Section 5 of
>>>>>  How is this “MUST” enforced?
>>>>> o In Section 7.1 I find it a bit odd discussing NATs in the specific 
>>>>> context of IPv6.
>>> If
>>>>>  you have a specific IPv6 NAT scenario in mind either spell it out or 
>>>>> give a
>>>>> reference
>>>>>  to a specification that describes the technology/use case.
>>>>> o In Section 8 and lines 784-785 has a “MUST NOT” for traffic that is not 
>>>>> known
>>> to be
>>>>>  congestion-controlled.. I would be interested in knowing how to enforce 
>>>>> this
>>> “MUST”
>>>>>  specifically in the Internet case.
>>>>> o Line 909 typo “ether” -> “either”.
>>>> 
>> 
> 
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to