Hi, Alvaro,

A new version (-05) has been submitted for you to review.

The draft is updated based on the comments from you and Sriram.

And it places a more strict limit on the slurmVersion JOSN member compared to 
the previous version by saying:  

        “Future additions to the specifications in this document MUST use an 
incremented value for the “slurmVersion” member."


Di


> 在 2018年1月31日,23:39,Alvaro Retana <[email protected]> 写道:
> 
> Di:
> 
> Hi!
> 
> Thanks for your prompt reply.  I look forward to an updated draft.
> 
> Alvaro.
> 
> On January 31, 2018 at 10:18:57 AM, Di Ma ([email protected]) wrote:
> 
>> Hi, Alvaro, 
>> 
>> Thanks for your comments. 
>> 
>> Please see my responses in lines. 
>> 
>> > 在 2018年1月30日,02:21,Alvaro Retana <[email protected]> 写道: 
>> >  
>> > Dear authors: 
>> >  
>> > I just finished reading this document. 
>> >  
>> > I have some comments (below) that should be easy to address — please take 
>> > a look. I need you to address the References before I start the IETF Last 
>> > Call because of the DownRef to rfc6483. 
>> >  
>> > Thanks! 
>> >  
>> > Alvaro. 
>> >  
>> >  
>> >  
>> > Major: 
>> >  
>> > M1. Section 3.1: I'm not sure what the Normative result is form this piece 
>> > of text: "JSON members that are not defined here MUST not be used in SLURM 
>> > Files, however Relying Parties SHOULD ignore such unrecognized JSON 
>> > members at the top level, while any deviations from the specification at 
>> > lower levels MUST be considered an error." (s/MUST not/MUST NOT) If the 
>> > not defined members MUST NOT be used, when would the RPs not ignore (or 
>> > even better, treat as errors) them? IOW, why use SHOULD instead of MUST? 
>> >  
>> 
>> We authors think MUST is better than SHOULD. 
>> 
>> And we would like to update section 3.1 saying: 
>> 
>> "This document describes responses in the JSON [RFC7159] format. JSON 
>> members that are not defined here MUST not be used in SLURM Files and 
>> additional top-level members MUST be defined in RFCs that update this 
>> document. Relying parties MUST ignore unrecognized JSON members at the top 
>> level, while any deviations from the specification at lower levels MUST be 
>> considered an error.” 
>> 
>> Here is the consideration:  
>> The current document describes local exceptions with regards to ROAs and 
>> Router Certificates, which are significant to local control of routing. The 
>> thought here was that we would leave an option for future other ’top-level’ 
>> elements to describe local exceptions with regards to other (future) RPKI 
>> objects as long as they have fundamental effect in routing control , while 
>> maintaining backward compatibility. But this is not explicit in the document 
>> as written. The risk here, as written, is that implementations can just add 
>> stuff at will for their own purpose and we can end up with the same member 
>> name being re-used. 
>> 
>> 
>> >  
>> >  
>> > M2. Section 4.2: "Before an RP configures SLURM files from different 
>> > source it MUST make sure there is no internal conflict among the INR 
>> > assertions in these SLURM files. To do so, the RP SHOULD check the entries 
>> > of SLURM file..." I think there's a Normative mismatch: "MUST make 
>> > sure...no...conflict" vs "SHOULD check the entries"; the SHOULD leaves the 
>> > door open to not always checking -- are there cases when the entries 
>> > wouldn't be checked *and* the MUST can still be guaranteed? It seems to me 
>> > like both keywords should be MUST. 
>> 
>> Yes.  
>> 
>> You are making sense here.  
>> 
>> >  
>> >  
>> > M3. Section 6: "...but if the RP updates its SLURM file over the network, 
>> > it MUST verify the authenticity and integrity of the updated SLURM file." 
>> > Please indicate that the mechanism to update files, and the 
>> > authentication/integrity verification are outside the scope of this 
>> > document. 
>> 
>> Agreed.  
>> 
>> We are going to add: 
>> 
>> "Yet the mechanism to update SLURM file to guarantee authentication and 
>> integrity is out of the scope of this document. " 
>> 
>> Besides, we need to change ‘source’ to ‘sources’ :-) 
>> 
>> >  
>> >  
>> > M4. References: 
>> >  
>> > M4.1. s/I-D.ietf-sidr-bgpsec-overview/rfc8205 ...and should be Normative. 
>> >  
>> > M4.2. I believe the following references should also be Normative: 
>> > ietf-sidr-rpki-rtr-rfc6810-bis/rfc8210, rfc6483, rfc6810, rfc6811 and 
>> > rfc7159. 
>> >  
>> > M4.3. [minor] Please update the references according to the Nits [1]. 
>> >  
>> > [1] 
>> > https://tools.ietf.org/idnits?url=https://tools.ietf.org/id/draft-ietf-sidr-slurm-04.txt
>> >   
>> >  
>> >  
>> 
>> Agreed.  
>> 
>> >  
>> > Minor: 
>> >  
>> > P1. "Relying party software MAY modify other forms of output in comparable 
>> > ways, but that is outside the scope of this document." If it’s out of 
>> > scope, then there shouldn't be any Normative language. s/MAY/may 
>> 
>> Agreed. 
>> 
>> >  
>> > P2. “Locally Added Assertions" are sometimes called "Locally Adding 
>> > Assertions". 
>> 
>> We authors are going to change 4.1 and 4.2 to say “Locally Added Assertions” 
>> because we refer to the elements. 
>> 
>> The lower case “locally adding assertions” in 3.2 is fine, because it 
>> describes an action. 
>> 
>> >  
>> > Nits: 
>> >  
>> > N1. s/control make use of RPKI data/control use of RPKI data 
>> 
>> Agreed. 
>> 
>> Di
> _______________________________________________
> sidr mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to