I think this is a good topic to review. I think we should look to this.

While we do this, can I check your view on the possible document status?
- If we need RFC2119 keywords to make the guidelines normative, would we
make the document BCP - or are you happy with standards keywords in an
informational document?

Gorry


> Barry Leiba has entered the following ballot position for
> draft-ietf-6man-udpchecksums-04: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> This is a combined DISCUSS on udpchecksums and udpzero.  First, let me
> say that I have no actual objection to publishing either of these
> documents.  What I'm concerned about is whether we're saying what we want
> to stay as a "standard", so let's discuss that:
>
> The issue comes when I look at udpzero Section 5.1 and udpchecksums
> section 5.  The numbered list in the latter is essentially a
> word-for-word copy of the numbered list in the former, with the "must"s
> and "may"s and "should not"s changed to upper case.  It always bothers me
> when a significant amount of important text is duplicated like that, but
> the real problem comes when I look at what this *says*.
>
> Because udpzero is informational, when it says, "If a zero checksum
> approach were to be adopted by the IETF, the specification should
> consider adding the following constraints on usage," that makes no
> normative requirement on any future protocol that runs on UDP and decides
> to bypass the UDP checksums.  Now, of course, we also have a document,
> udpchecksums, which defines what to do if you do tunneling on UDP and you
> want to skip the outer checksums (because you have inner ones).  *That*
> document makes this list normative.
>
> But what happens if, later, someone decides to document how to do, let's
> say, media streaming over UDP with zero checksums.  The analysis in
> udpzero applies, of course, but the new document is under no obligation
> to consider it or any of those usage restrictions in Section 5.1.  (It
> might be that such a document could never get past the current community
> and ADs, but I'm not sure we want to leave that to chance.)
>
> So the question comes to what we want to say normatively.  Which is it
> that we want a standard saying?
>
> 1. If you tunnel packets over UDP and want to avoid the UDP checksums,
> you need to use this list of restrictions.  But other applications over
> UDP that want to avoid the UDP checksums can make entirely different
> decisions.
>
> or
>
> 2. If you do *anything* over UDP and want to avoid the UDP checksums, you
> need to use this list of restrictions.  And here's how tunneling over UDP
> works.
>
> I think (2) is right, but the way the documents are structured now says
> (1).
>
> Discussion, please....
>
>
>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to