David,

Well said...  a couple of points inline prefixed with "DY>":

On Nov 5, 2008, at 10:47 AM, David A. Bryan wrote:

Personally, I think the slippery slope we are risking here is the
other way...in the RAI in general we keep throwing more and more
mandatory things into our protocols, and the spec itself becomes more
and more irrelevant when people ignore parts of the spec that do not
apply to their application.

DY> Whoa..... wait, wait... you want to put out a protocol that people actually *implement*? :-)

DY> Seriously, your point is well taken, we DO need to put out specs that people are actually able to implement, but I would argue it from a slightly different point...

The fact that many people do ignore our
"sage advice" is a symptom of what is wrong with the default approach
of making everything mandatory. In my mind, this is why SIP
compatibility is so elusive. Who actually implements everything we say
is mandatory in the many SIP specs? With no guidance other then "you
must do it all", we end up with non-compatible implementations.

DY> ... that part of the reason why we have implementation issues is, in fact, that we are trying to do too many things in some of the protocols. However, my experience with non-compatible implementations of many of the other SIP protocols is that we have too many "SHOULD"s or places where we have options that people can choose. I mean, look at the fact that we've needed to spin up a whole new working group, BLISS, primarily because we have about 4 different ways to do Do Not Disturb inside of SIP! (And a number of other reasons...)

DY> In my personal opinion, for solid interop we need fewer SHOULDs and should have mainly MUSTs... but to your point, the simpler we can make the protocol, the better.


If I am a carrier and am building a P2PSIP system for use exclusively
inside my network, why implement ICE?

DY> Agreed.

If I am a developer looking to
use P2PSIP on motes for a small sensor network, I may not want to use
TLS. I certainly may not want to use it for testing.

DY> Agreed.

I think if
anything we should just plain support a non-TLS mode. Don't call it a
"test-mode". Just call it a non-TLS mode.

DY> So why don't we throw out the TLS mode entirely and just have the base be NON-TLS and then write a companion document that explains how to do *secure* P2PSIP?

DY> That way for an implementor they can say that they support RFCxxxx for P2PSIP and then also RFCyyyy for secure P2PSIP. This gets around all of the SHOULDs that cause interop problems.


We need to stop assuming that implementors are not able to decide for
themselves when it is or is not appropriate for something as basic as
security to be implemented. The IETF is not the only group capable of
making the decision of whether this is needed -- let the implementors
who actually understand their particular application make the decision
-- and just make it optional. If the application needs TLS, the
implementors will be smart enough to do so and their customers will
also have strong reasons to demand it be implemented.


DY> Sure, but going back to ensuring *interop*... if we just let everyone decide for themselves which parts of the spec they will implement, how in the world are we going to be able to do any real interop testing?

DY> I would argue we should carve out the interoperable pieces into their simplest forms and then advance those as separate RFCs. That way implementors can choose among the RFCs, but at the very least they can say they are "RFCxxxx-compliant" and that will be understood by other vendors - and can be tested.

My 2 cents,
Dan

--
Dan York, CISSP, Director of Emerging Communication Technology
Office of the CTO    Voxeo Corporation     [EMAIL PROTECTED]
Phone: +1-407-455-5859  Skype: danyork  http://www.voxeo.com
Blogs: http://blogs.voxeo.com  http://www.disruptivetelephony.com

Build voice applications based on open standards.
Find out how at http://www.voxeo.com/free





_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to