Hi Peter, Thanks a lot for your review. I will ask the authors to address your comments in the next version of the draft.
Regards Suresh On 03/09/2013 03:13 AM, Peter Yee wrote: > I am the assigned Gen-ART reviewer for this draft. For background on > Gen-ART, please see the FAQ at > <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq> > > Document: draft-ietf-intarea-nat-reveal-analysis-05 > Reviewer: Peter Yee > Review Date: Mar-08-2013 > IETF LC End Date: Mar-08-2013 > IESG Telechat date: TBD > > Summary: This draft is on the right track but has open issues, described in > the review. [Ready with issues.] > > This draft catalogs and analyzes various means of supplying a host > identifier to a > > remote server when Carrier Grade NAT or similar host obscuring technology > is in use. > > General: There were sentences in the draft that I could not parse even in > the context > of surrounding text. That's primarily why I'm marking this draft as > "Ready with > issues". These sentences are supplied below. Mostly, the document has a > fair number > of nits. The general concept is fine. > > General: hyphenate uses of "address sharing" when it used as an adjective. > For > example, "address-sharing device". > > General: expand acronyms on first use except if they are really well known > in > our community (e.g., TCP/IP) or where they appear in the abstract. > Examples of > acronyms in need of expansion are HIP, XFF, S. > > General: You will probably want to resolve Internet Draft references to > something > more permanent. > > General: The term "broken" should be replaced with something more specific > or useful. > I've made some suggestions below. > > Section 1, 2nd paragraph, last sentence: delete "an" before "information". > > Section 1, 3rd paragraph: change "are" to "include". > > Section 1, 3rd paragraph: change "customers unsatisfaction" to "and > customers' dissatisfaction". > > Section 2, 1st paragraph, 2nd sentence: delete "an" before "extra". > Change "than" to > "beyond". > > Section 2, 1st paragraph, 3rd sentence: replace this sentence with "We > call this > information the HOST_ID." > > Section 2, 2nd paragraph: add a serial comma after "subscriber". Serial > comma use in > the draft was inconsistent. > > Section 2, 3rd paragraph, 3rd sentence: I'm not sure why the HOST_ID and > public IP address would be "relatively" unique. Assuming that HOST_IDs > are unique amongst > the hosts hidden behind the public IP address and the public IP address is > unique, > I would have thought that the combination was globally unique. My > confusion may arise > from the 4th sentence which is incomplete. Perhaps those two sentences > could be > rewritten for clarity. > > Section 2, 4th paragraph, 1st sentence: change "put" to "conveyed". > > Section 2, 4th paragraph, 2nd sentence: change "put" to "conveyed". > > > Section 3, 2nd paragraph, 1st sentence: considering using > "identifiability" instead of > "uniqueness". > > Section 3, 2nd paragraph, 2nd sentence: replace "which" with "what". > > Section 3,1, 4th paragraph: add a comma after "re-write". Change > "re-write" to > "rewrite". > > Section 3.1, 5th paragraph: I don't quite follow what's being said here. > Is the point that the address-sharing function should reveal the same > HOST_ID for any given host > regardless of what layer or mechanism that HOST_ID is being conveyed > across? How does > this relate to interference between HOST_IDs? > > Section 4.1.1, 1st paragraph, 1st sentence: delete "an" before > "information". > > Section 4.1.1, 1st paragraph, 3rd sentence: insert ", there are" after > "hence". > > Section 4.1.1, 4th paragraph, consider replacing with: "Address-sharing > devices using > this solution would be required to indicate that out of band, possibly > using a special > DNS record." > > Section 4.1.2, 3rd paragraph, 2nd sentence: add a comma after "scenario". > Change "broken" to "ill-advised". > > Section 4.2.1, 1st paragraph, 2nd sentence: add "A " at the beginning of > the sentence. > > Section 4.2.1, 1st paragraph, 4th sentence: rewrite as "This IP option > allows the > conveyance of an IPv4 address, an IPv6 prefix, a GRE key, an IPv6 Flow > Label, etc." > > Section 4.2.1, 2nd paragraph: insert "an" before "IP". > > Section 4.2.2, 1st paragraph, 1st sentence: change "for" to "to". > > Section 4.2.2, 1st paragraph, 2nd sentence: use of the term "filter" in > this sentence > is not clear. Do you mean that that routes and middleboxes remove the IP > options? Or > that they remove packets with IP options? Or that they take other actions > based on the > presence of IP options? Please clarify. > > Section 4.2.2, 2nd paragraph: replace "As a" with "In". Define > "host-hint" somewhere. > Is it meant to be equivalent to HOST_ID? > > Section 4.3.1, 3rd sentence: change "their" to "its" both places in the > sentence. > Insert "or" before "subscriber". > > Section 4.3.2, 2nd paragraph, 2nd sentence: insert "a" before "HOST_ID" > > Section 4.3.2, 2nd paragraph, 3rd sentence: change "in host" to "on the > host". Insert > "the" before "address", and add a comma after "function". > > Section 4.3.2, 1st bullet item: this is the IETF. We don't need no > stinkin' OSI! :-) > > Section 4.3.2, 1st bullet item, 2nd sentence: replace the sentence with > "Moreover, an > updated version of [I-D.wing-nat-reveal-option] no longer allows conveyance > of a full IP address as the HOST_ID is encoded in 16 bits." > > Section 4.3.2, 2nd bullet item, 1st sentence: delete the comma after > "limited". > > Section 4.3.2, 2nd bullet item, 4th sentence: delete the comma after "ACK". > > Section 4.3.2, 2nd bullet item, 5th sentence: move "only" before "allows". > Change > "to enclose" to "enclosing". > > Section 4.3.2, 3rd bullet item, 3rd sentence: the characterization of > HOST_ID as > leaked information seems pejorative. And how is a "communication leg" > defined? > Is this a standard term for communications between a CGN and a remote > server, or for > other backbone-carried communications? > > Section 4.3.2, 4th bullet item, append a comma after "particular". > > Section 4.3.2, 5th bullet item, 1st sentence: replace "to" with "the". > Change > "preserve" to "preservation of". > > Section 4.3.2, 5th bullet item, 3rd sentence: change "to reveal" to > "revealing". > > Section 4.4.1, 1st paragraph, 1st sentence: move "not" before "to". > Change "at" to > "within". Change "which" to "that". > > Section 4.4.1, 1st paragraph, 2nd sentence: change "This" to "The". > Append "of the > conveyed information" after "format". > > Section 4.4.1, 2nd paragraph, 3rd sentence: change "their" to "its". > > Section 4.4.1, 3rd paragraph: insert "the" before "X-Forwarded-For". > > Section 4.4.2, 1st paragraph, 1st sentence: delete "the" before "address". > > Section 4.4.2, 2nd paragraph, 1st sentence: specify by whom the initiative > was launched. > > Section 4.4.2, 2nd paragraph, 2nd sentence: append "who are" after > "Wikipedia". > > Section 4.4.2, 4th paragraph, 1st sentence: would "transited" be more > appropriate than > "crossed"? Insert "the" before "Forwarded". > > Section 4.4.2, 6th paragraph: change "implementation" to > "implementations". And that > begs the question: implementations of what? Delete "some" before > "parsing". Insert > "an" before "XFF". > > Section 4.4.2, 7th paragraph: why is this "may be broken"? Either the > Forwarded header can be injected or it cannot. Under encryption, the only > way I can see to insert the > header is if the encrypted TLS session is passing through a > man-in-the-middle proxy > that is spoofing both of ends of the communication in order to be able to > transparently > decrypt the traffic. > > Section 4.5.1, 1st paragraph, 4th sentence: insert "The" before '"PROXY"'. > > Section 4.5.2, 1st paragraph, last sentence: change "raise" to "arise". > Append a > comma after "firewalls". > > Section 4.5.2, 2nd paragraph: change "broken" to "infeasible". Change > "can not" to "cannot". > > Section 4.6.1, 3rd paragraph: replace "do" with "are". Change "require" > to "required". > > Section 4.6.1, 4th paragraph: insert "an" before "option". > > Section 4.6.2, 3rd paragraph: move "also" before "offering". I presume > the "IP connectivity services" are those being offered to the host being > identified, but > that should be made clear in the text since the sentence is vague as to > which end > of the conversation is being reference. > > Section 4.7.1: delete "an" before "identity". > > Section 4.7.2, 2nd paragraph, 1st sentence: insert "having" after "is". > > Section 4.7.2, 2nd paragraph, 2nd sentence: delete "ported to be". > > Section 4.8, title: insert "of" after "Use". > > Section 4.8.1, 2nd paragraph, 2nd sentence: replace "differentiating" with > "host-identifying". > > Section 4.8.2, 1st bullet item: insert "The" before "Address" and then > make "Address" > lower case. I'm not sure what this sentence is trying to tell me, however. > > Section 4.8.2, 2nd bullet item: replace "an" with "that the". > > Section 4.8.2, 4th bullet item: delete "Some" before "implementation" and > then > capitalize "implementations". Delete "to" before "delay" and append "of" > after "delay". > Change "receiving" to "receipt of". Delete the comma after "Request". > > Section 4.8.2, 5th bullet item: delete "may" before "receive" and then > change "receive" > to "receives". > > Section 4.8.2, 8th bullet item: delete "a". > > Section 4.8.2, 9th bullet item, 2nd sentence: change the first "are" to > "is". Delete > "to be". > > Section 4.9.1, 2nd paragraph, 2nd sentence: insert "the" before "address". > Append a > comma after "IDENT". > > Section 4.9.1, 2nd paragraph, 4th sentence: change "16 bit" to "16-bit". > > Section 4.9.2, 1st bullet item, 2nd sentence: change "Alternatives" to > "Alternative". > Change "mechanism" to "mechanisms". Change "design" to "designed". I > don't think you > want the list of other transport mechanisms to include TCP since you've > already said > that IDENT is specific to TCP. > > Section 4.9.2, 3rd bullet item, 1st sentence: insert "that" before "the > address". > Insert "the" before "IDENT". > > Section 4.9.2, 4th bullet item, 2nd sentence: change "This" to "Such a". > Change > "deployable" to "feasible". Delete "heavy and" unless you want to explain > what > heavy means. > > Section 4.9.2, 5th bullet item: delete "Some" and capitalize > "implementations". > Delete "to" before "delay" and append "of" after "delay". Change > "receiving" to > "receipt of". Delete the comma after "response". > > Section 4.9.2, 6th bullet item: delete "a". > > Section 4.9.2, 7th bullet item, 1st sentence: change "are" to "is". > > Section 4.9.2, 7th bullet item, 2nd sentence: change "even" to "further". > > Section 4.9.2, 9th bullet item: change "non legitimate" to "illegitimate". > > Section 5, 1st paragraph after the Table 1 caption: append a comma after > "[Options]". > Insert ", and" before "ExtendTCP". > > Section 5, 2nd paragraph after the Table 1 caption: change "Address" to > "address". > > Section 5, 3rd paragraph after the Table 1 caption: change "to establish" > to > "for establishing". > > Section 5, 4th paragraph after the Table 1 caption, 3rd sentence: change > "hold" to > "delay". Change "receiving" to "receipt of". > > Section 5, 4th paragraph after the Table 1 caption, 4th sentence: change > "at" to "on". > > Section 5, 5th paragraph after the Table 1 caption, 3rd sentence: change > "hold" to "delay". Change "receiving" > to "receipt of". Insert "the" before "IDENT". > > Section 5, 5th paragraph after the Table 1 caption, 4th sentence: change > "at" to "on". > Consider rewriting this sentence and the similar one in the previous > paragraph for even > greater clarity. > > Section 7, 3rd paragraph: insert "used" before "to convey". > > Section 8, 1st paragraph: append a comma after "Halpern". > > Section 8, 2nd paragraph: append a comma after "Wing". > > Section 8, 4th paragraph: change to "The privacy text was provided by A. > Cooper." > >