> >> humans are capable of reading text in a language w/o needing a tag to
> > identify it.
> >
> > I emphatically disagree. If I send you the following reason message,
> > will it help you?
> >
> > Сервер отключен для пусконаладочных работ на три часа
> 
> This example doesn't make sense to me, it seems contrived to make some point
> but it's not realistic.
> 
> People aren't contacting random IPsec servers that are mis-configured for 
> their
> users. If the user wouldn't understand the above language then the operator
> wouldn't configure it.

There are a lot of VPN services in the wild that provide access
to the Internet worldwide from where it is restricted. Some of them use 
IKEv2/IPsec
and they don't care about the languages their users understand. For the users
it is a just a "random IPsec server".

Regards,
Valery.

> Thanks,
> Chris.
> 
> >
> > You will probably use Google translate and it will ask you what
> > language it is in?
> > Sometimes it can correctly guess the language (and the text above is
> > an easy example), but often not.
> > I also want to point out that some languages (e.g. Finnish) are very
> > difficult for machine translation.
> >
> > FWIW, using language tags is not my whim. If we leave human-readable
> > text in the protocol, then we MUST support multiple languages and MUST
> > be able to transfer language information to be compliant with BCP18
> > (RFC 2277, Section 4.2, Section 4.4).
> > I don't want to deal with all this issues, so I'd rather to not
> > include fields with human-readable text in IKEv2.
> >
> > Regards,
> > Valery.
> >
> >> I do think the encoding might need to be specified, since that is
> > something the
> >> computer may need to understand.
> >>
> >> Thanks,
> >> Chris.
> >>
> >>
> >>
> >> >
> >> >     In general, I think it is a bad idea to transmit text strings
> >> > to be read by users in a low level
> >> >     protocol which IKEv2 is. This is an UI issue, and it is the UI
> >> > that should properly display to the user in a user
> >> >     chosen language what is happening.
> >> >
> >> > 2. The list of reasons looks to me both incomplete and excessive at
> >> > the same time.
> >> >     For example, CONFIGURATION_CHILD_REMOVED and
> >> CONFIGURATION_IKE_REMOVED
> >> >     are not needed, since you either delete IKE SA or Child SA in a
> >> > single exchange, so it is
> >> >     always clear what configuration is removed and only one such
> >> > reason would suffice.
> >> >     SIMULTANEOUS_REKEY adds no new information,
> >> >     since you always understand this reason from local logs. On the
> >> > other hand,
> >> >     it is not specified what to indicate in the reason when ESP SA
> >> > is being deleted
> >> >     in response to deleting the tied ESP SA for the other direction.
> >> >
> >> >    In general, I think that indicating the reason the SA is deleted
> >> > doesn't help much the user much.
> >> >    In many cases it can be inferred from local logs. And if it
> >> > cannot, then you probably
> >> >    will to contact the other end in any case to get more detailed
> >> > information on the reason,
> >> >    in which case sending the reason on the wire has little value.
> >> >
> >> > 3. Perhaps the most useful field is Downtime. But thinking more
> >> > about
> > this,
> >> >    I believe that since this value is only a hint, you will
> >> > probably not trust it.
> >> >    For example, if you have to communicate to the peer ASAP and it
> > deletes
> >> >    SA indicating that downtime is 1 hour, you will not wait for all
> >> > this time,
> >> >    you will try to establish new SA every minute (it costs you
> >> > nothing,
> > but
> >> >    you have a chance to get it up earlier).
> >> >
> >> > Regards,
> >> > Valery.
> >> >
> >> > _______________________________________________
> >> > IPsec mailing list -- ipsec@ietf.org To unsubscribe send an email
> >> > to ipsec-le...@ietf.org

_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to