Hi Robert, 

Thanks for your comments, please see my replies inline:

> -----Original Message-----
> From: Robert Sparks [mailto:rjspa...@nostrum.com]
> Sent: Tuesday, October 20, 2015 11:10 AM
> To: Dongjie (Jimmy); General Area Review Team; p...@ietf.org;
> draft-ietf-pals-redundancy-spe....@ietf.org
> Subject: Re: Gen-art LC review: draft-ietf-pals-redundancy-spe-02
> 
> 
> 
> On 10/19/15 9:34 PM, Dongjie (Jimmy) wrote:
> > Hi Robert,
> >
> > Thanks a lot for your review and comments. Please see my replies inline:
> >
> >> -----Original Message-----
> >> From: ietf [mailto:ietf-boun...@ietf.org] On Behalf Of Robert Sparks
> >> Sent: Saturday, October 17, 2015 5:31 AM
> >> To: General Area Review Team; i...@ietf.org; p...@ietf.org;
> >> draft-ietf-pals-redundance-spe....@ietf.org
> >> Subject: Gen-art LC review: draft-ietf-pals-redundancy-spe-02
> >>
> >> I am the assigned Gen-ART reviewer for this draft. The General Area
> >> Review Team (Gen-ART) reviews all IETF documents being processed by
> >> the IESG for the IETF Chair.  Please treat these comments just like any 
> >> other
> last call comments.
> >>
> >> For more information, please see the FAQ at
> >>
> >> <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.
> >>
> >> Document: draft-ietf-pals-redundancy-spe-02
> >> Reviewer: Robert Sparks
> >> Review Date: 16 Oct 2015
> >> IETF LC End Date: 19 Oct 2015
> >> IESG Telechat date: 22 Oct 2015
> >>
> >> Summary: Almost ready for publication as PS but with issues that need
> >> to be discussed/addressed
> >>
> >> This document is hard to read. It is more acronym-laden than it needs to 
> >> be.
> > We will expand the acronyms on first use in next revision.
> That won't change how hard this is to read.
> 
> Expanding the acronyms on first use won't make the prose later in the
> document any different.
> The use of acronyms for the elements involved in almost all of the prose is
> unnecessary. The words for them are short enough.

Sorry for making this document hard to read, could you provide some advices on 
how to improve the readability? 

> >
> >> -----
> >> There is a process issue that the IESG should pay attention to.
> >> The shepherd writeup says this:
> >>
> >>     "There is one IPR declaration (1911) raised in November 2012 against
> >>      an early version of the draft.  There was no discussion in the WG
> >>      related to this."
> >>
> >> That happens sometimes, but it's much better to have a real
> >> indication that the group considered the disclosure and explicitly decided 
> >> not
> to change directions.
> >> -----
> > I hope Andy and Deborah have solved your concern on this.
> >
> >> The last sentence of the 2nd paragraph (declaring multi-homing on
> >> both sides of an S-PE out of scope) should be moved earlier in the 
> >> document.
> >> The introduction and perhaps even the abstract can be clearer about
> >> what _is_ in scope.
> > Agreed, will move it to the introduction of the document.
> Thanks.
> >
> >> It needs to be clearer where the normative description of behavior is.
> >> I think you're intending it to be the first part of section 3. I have
> >> not worked through the references enough to ensure that it is complete.
> > Yes, the first part of section 3 defines the operation of S-PE.
> >
> >> The third paragraph starts off "In general, ...". Are there any
> >> specific cases where the requirements that follow do not hold? If so,
> >> there needs to be more description. If not, please delete "In general,".
> > We will remove "in general" in next revision.
> >
> >> Are sections 3.1 and 3.2 supposed to be only examples? Would the
> >> specification of the protocol be complete if they were deleted? If
> >> not, something needs to be moved up into the main part of section 3.
> >> For instance, is the SHOULD at the end of 3.1 a requirement placed by
> >> this document, or is it restating a requirement from somewhere else?
> >> Similarly, please inspect the SHOULD in the second paragraph of 3.2.
> >>
> >> I also suggest moving 3.1 and 3.2 into their own section, clearly
> >> labeling them as examples.
> > Good question. The last sentence of section 3.1 and 3.2 can be moved up into
> the main part.
> >
> > Since section 3.1 and 3.2 specifies the typical scenarios, my feeling is 
> > they are
> more than examples. May be better to keep them in section 3?
> No, I don't think so.
> 
> If they can't be removed, then there is some part of this addition to the
> protocol suite that you are specifying by example, rather then specifying the
> behavior explicitly. That usually means you're under-specifying, and hoping
> people will infer (guess) the right thing to do in the unspecified cases. You 
> will
> end up with better interoperability by being explicit.

I got your point, and I think the document is not under-specifying. Thus we can 
move section 3.1 and 3.2 to their own section.

> >> Is it worth more explanation in the document why you've added the
> >> MUST NOT in the first paragraph of section 3?
> > Because if S-PE Bypass Mode is used, the S-PE will not receive the PW status
> message originated by T-PEs. We will add some explanation about this.
> Thanks again.
> >
> >> The security considerations section only points off to other documents.
> >> Most of those just point to each other. Chasing it back, there's some
> >> meat in the security considerations section of 4447, and some in
> >> 5085, but it's a real chase to find what's relevant.  Please consider
> >> calling out what an implementer needs to consider explicitly here.
> > Since this document is mainly about reusing the redundancy mechanisms of
> RFC6870 on the S-PE nodes, we think the security considerations of these
> referenced documents could suffice.
> That misses the point - whatever is important in those considerations for what
> this document is talking about is buried.
> Why didn't you just copy the security considerations section of 6870 into this
> document? (I'm not suggesting you do that - your use of "mainly" above says
> that wouldn't be enough. _Why_ it's not enough is worth capturing in this
> document.)
> 
> Isn't there something to new to say here about failure cases? You essentially
> have some new actors that (if they were to misbehave, or if someone could
> pretend to be them) could _cause_ at least the S-PE to believe there was a
> failure. Is that already discussed somewhere?

I'm thinking about whether the new procedures on S-PE would introduce any new 
attack vectors. 

What about we say something like: "Since PW redundancy is provided on the S-PE 
nodes, it is important that the security mechanisms as defined in [RFC 4447], 
[RFC 6073] and [RFC 6478] are implemented to ensure that the S-PE nodes and the 
messages received by the S-PE nodes are not compromised."

Best regards,
Jie

> > And for an implementer IMO there is nothing new to be considered.
> >
> > Best regards,
> > Jie
> >

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to