Re: [Gen-art] Gen-ART LC review of draft-ietf-isms-transport-security-model-12

2009-04-16 Thread Tom.Petch
I am surprised not to have seen more formal reviews of the quartet for isms I-Ds
whose Last Call has just finished, updating as they do a Standard, while at the
same time introducing a Transport subsystem and model, and also introducing a
new (to snmp) way of providing Security.

I do not know what or how these reviews are triggered but I would have expected
a good deal more than this one and the one that appeared as I was drafting this
response, a round dozen even.

Tom Petch


- Original Message -
From: Ben Campbell b...@estacado.net
To: i...@hardakers.net; dharring...@huawei.com; General Area Review Team
gen-art@ietf.org
Cc: j.schoenwael...@jacobs-university.de; i...@ietf.org
Sent: Friday, April 10, 2009 10:05 PM
Subject: Gen-ART LC review of draft-ietf-isms-transport-security-model-12


snip

___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] Gen-ART LC review of draft-ietf-isms-transport-security-model-12

2009-04-16 Thread Ben Campbell


On Apr 16, 2009, at 2:29 AM, Tom.Petch wrote:

I am surprised not to have seen more formal reviews of the quartet  
for isms I-Ds
whose Last Call has just finished, updating as they do a Standard,  
while at the
same time introducing a Transport subsystem and model, and also  
introducing a

new (to snmp) way of providing Security.

I do not know what or how these reviews are triggered but I would  
have expected
a good deal more than this one and the one that appeared as I was  
drafting this

response, a round dozen even.


Gen-art reviews are assigned to a team of volunteers (i.e. the general  
area review team.) I'm not sure about the assignment criteria, but I  
_think_ we try to catch most, if not every, draft being IETF last  
called for publication.





Tom Petch


- Original Message -
From: Ben Campbell b...@estacado.net
To: i...@hardakers.net; dharring...@huawei.com; General Area  
Review Team

gen-art@ietf.org
Cc: j.schoenwael...@jacobs-university.de; i...@ietf.org
Sent: Friday, April 10, 2009 10:05 PM
Subject: Gen-ART LC review of draft-ietf-isms-transport-security- 
model-12



snip

___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] Gen-ART LC review ofdraft-ietf-isms-transport-security-model-12

2009-04-16 Thread Mary Barnes
Yes, every document that goes through IETF-LC is assigned one gen-art
reviewer to review the document, but the gen-art review process isn't
really a formal part of the IETF document process - it happens in
parallel with IETF-LC and the reviews are done on behalf of the General
Area director.  It would not be possible for us to cover all the docs
with more than one reviewer - the team is quite small.  The reality
(from my experience) seems to be that the only reviews you can count on
during IETF-LC are those from gen-art, sec-dir (they follow a similar
model as I understand it) and other areas as applicable (e.g., APP, OPS,
etc.). Although some of the latter reviews often happen earlier in the
process.  Each of the reviews from the Gen-ART team are prefaced with a
link to a Gen-ART FAQ:
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html

Regards,
Mary Barnes
Gen-ART secretary

-Original Message-
From: gen-art-boun...@ietf.org [mailto:gen-art-boun...@ietf.org] On
Behalf Of Ben Campbell
Sent: Thursday, April 16, 2009 9:30 AM
To: Tom.Petch
Cc: General Area Review Team; i...@ietf.org
Subject: Re: [Gen-art] Gen-ART LC review
ofdraft-ietf-isms-transport-security-model-12


On Apr 16, 2009, at 2:29 AM, Tom.Petch wrote:

 I am surprised not to have seen more formal reviews of the quartet for

 isms I-Ds whose Last Call has just finished, updating as they do a 
 Standard, while at the same time introducing a Transport subsystem and

 model, and also introducing a new (to snmp) way of providing Security.

 I do not know what or how these reviews are triggered but I would have

 expected a good deal more than this one and the one that appeared as I

 was drafting this response, a round dozen even.

Gen-art reviews are assigned to a team of volunteers (i.e. the general
area review team.) I'm not sure about the assignment criteria, but I
_think_ we try to catch most, if not every, draft being IETF last called
for publication.



 Tom Petch


 - Original Message -
 From: Ben Campbell b...@estacado.net
 To: i...@hardakers.net; dharring...@huawei.com; General Area 
 Review Team
 gen-art@ietf.org
 Cc: j.schoenwael...@jacobs-university.de; i...@ietf.org
 Sent: Friday, April 10, 2009 10:05 PM
 Subject: Gen-ART LC review of draft-ietf-isms-transport-security-
 model-12


 snip

 ___
 Gen-art mailing list
 Gen-art@ietf.org
 https://www.ietf.org/mailman/listinfo/gen-art

___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

2009-04-16 Thread Ted Lemon

On 2009/4/13 Ralph Droms rdr...@cisco.com wrote:

For example, would a host process
information received from a Starbucks network over its 802.11
interface differently from information received a home network over  
the 802.11 interface?


It's even more fun than that.   How do we reliably know that we are at  
Starbucks, and not at home?   The SSID?   That's not an authenticated  
token.   Currently Windows makes security decisions based on the  
SSID.   You could call this the best answer they could come up with  
for a problem with no good answers.   Or you could say that it  
instills the user with a false sense of security.   Either way, it's  
not something I'd be comfortable seeing in a protocol spec, so if the  
client is in fact to make decisions as you've suggested, we'd need a  
secure way of doing this.   I don't know enough about WPA Enterprise  
to know if there's a bidirectional authentication going on there -  
from the UI perspective it looks like it's one-way.


___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

2009-04-16 Thread Ralph Droms
Yup ... there is currently no way to provide authenticated, meaningful  
identification of the network(s) to which a host is attached.  Without  
that identification, it's pretty hard to write any reasonable policies.


- Ralph

On Apr 16, 2009, at 1:26 PM 4/16/09, Ted Lemon wrote:


On 2009/4/13 Ralph Droms rdr...@cisco.com wrote:

For example, would a host process
information received from a Starbucks network over its 802.11
interface differently from information received a home network over  
the 802.11 interface?


It's even more fun than that.   How do we reliably know that we are  
at Starbucks, and not at home?   The SSID?   That's not an  
authenticated token.   Currently Windows makes security decisions  
based on the SSID.   You could call this the best answer they could  
come up with for a problem with no good answers.   Or you could say  
that it instills the user with a false sense of security.   Either  
way, it's not something I'd be comfortable seeing in a protocol  
spec, so if the client is in fact to make decisions as you've  
suggested, we'd need a secure way of doing this.   I don't know  
enough about WPA Enterprise to know if there's a bidirectional  
authentication going on there - from the UI perspective it looks  
like it's one-way.




___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] Gen-ART review of draft-ietf-dccp-serv-codes-08

2009-04-16 Thread Lars Eggert

Hi, authors,

this is the only IETF last call comment I have seen. It looks like  
changes will be required, so I'm placing this document in the Revised  
ID Needed state.


Lars

On 2009-4-15, at 2:07, black_da...@emc.com wrote:


Gorry,

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call
comments you may receive.

Document: draft-ietf-dccp-serv-codes-08
Reviewer: David L. Black
Review Date: April 14, 2009
IETF LC End Date: April 16, 2009

Summary:
This draft is on the right track, but has open issues, described
in the review.

Comments:
This draft expands the use of DCCP service codes, in essence
mandating that servers dispatch to DCCP services based on service
code *in addition* to server port (i.e., no longer dispatch only
on server port).  In addition it defines a few basic DCCP services
that are useful for testing and benchmarking (e.g., chargen).

All of the points noted in this review are minor, but the ones
tagged below with ** are important.  The problems with the
security considerations text in Section 5.3 are the primary
reason that the review summary is open issues rather than
nits.  This reviewer's expectation is that all of these
points will be relatively easy to address, but they do need
attention.

Table of Contents needs to be regenerated - not everything is
on p.4 ;-).

Section 3.2:

   Middlebox [RFC3234] implementors
  therefore need to note that new DCCP connections are identified by
  the pair of Server Port and Service Code.

Add in addition to the IP address to the end of the above
sentence for clarity.

** Section 3.2:

  This means that the IANA
  may allocate a server port to more than one application.

This sentence needs to be rephrased and extended, as this document
does not make any changes to the way that IANA currently allocates
server ports.  The may above is susceptible to a misreading that
this draft does change IANA server port allocation procedures for
DCCP - another document would be necessary to make that change.

** Section 3.3.2 needs to be rewritten.  It should be about
associating the same service code with multiple ports, but the
one and only sentence is about associating a port with multiple
service codes.  The result of the rewrite should be that associating
the same service code with multiple ports is fine for both active
and passive ports - the passive case is of particular importance
to this draft.

** Section 5.3 needs to say something about extent of support (or
lack thereof) for DCCP in IKEv2.  In particular, it is important
to state that IKEv2 as currently specified does not negotiate DCCP
service codes.

** The last paragraph of Section 5.3 contains 2 sentences saying
that this is not an issue.  It is not clear what this refers
to, making it impossible to determine what the issue might be.

Thanks,
--David

David L. Black, Distinguished Engineer
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953 FAX: +1 (508) 293-7786
black_da...@emc.comMobile: +1 (978) 394-7754





smime.p7s
Description: S/MIME cryptographic signature
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] review of draft-ietf-mpls-p2mp-te-mib-08.txt (summary)

2009-04-16 Thread Francis Dupont
I have been selected as the General Area Review Team (Gen-ART) 
reviewer for this draft (for background on Gen-ART, please see 
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html). 

Please resolve these comments along with any other Last Call comments 
you may receive. 

Document: draft-ietf-mpls-p2mp-te-mib-08.txt
Reviewer: Francis Dupont
Review Date: 2009-04-16
IETF LC End Date: 2009-04-17
IESG Telechat date: unknown

Summary: Ready

Regards

francis.dup...@fdupont.fr

PS: I'll send full comments tomorrow morning.
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

2009-04-16 Thread Giyeong Son
Again as I mentioned, in order to prepare or build an efficient routing
policy and to select an efficient connection/interface, it would be
necessary to identify, classify and/or prioritize underlying network
characteristics or information of the attached networks. 

In addition, as many network characteristics which are essential to be
used for simultaneous use of multiple interfaces are not generic forms
(e.g. SSID only for 802.11), these network characteristics may require a
mechanism to make them be associated with generic (formed) elements used
for routing policy preparation and routing decision. Therefore, if MIF
can provide an efficient guideline or mechanism for associating, it
would be really amazing. 

I believe, the current IP network related protocols and standardized
technologies may not be enough to support that on multiple interface
network environment. 

I think each vendor, carrier, service provider and/or technology, which
utilizes or supports simultaneous use of multiple
connections/interfaces, may have their own proprietary mechanism in
terms of gathering of network characteristics of each interface/access
network technology (e.g. WiFi, GPRS, CDMA, Bluetooth, etc.), their
mapping mechanism with generic formed elements, routing policy and
decision mechanisms with different IP based service networks owned by
different service providers or different IP network enabling core
networks owned by different carriers.

So, the problem Ted and Ralph are addressing seems to be just one of
issues (but only for WiFi network environments) in terms of network
characteristic that may be necessary to be considered during selection
of an efficient connection/interface from multiple candidates.

Giyeong  

-Original Message-
From: Ralph Droms [mailto:rdr...@cisco.com] 
Sent: April 16, 2009 1:32 PM
To: Ted Lemon
Cc: Giyeong Son; Hui Deng; dhc WG; gen-art@ietf.org; mif; i...@ietf.org;
black_da...@emc.com
Subject: Re: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

Yup ... there is currently no way to provide authenticated, meaningful
identification of the network(s) to which a host is attached.  Without
that identification, it's pretty hard to write any reasonable policies.

- Ralph

On Apr 16, 2009, at 1:26 PM 4/16/09, Ted Lemon wrote:

 On 2009/4/13 Ralph Droms rdr...@cisco.com wrote:
 For example, would a host process
 information received from a Starbucks network over its 802.11 
 interface differently from information received a home network over 
 the 802.11 interface?

 It's even more fun than that.   How do we reliably know that we are  
 at Starbucks, and not at home?   The SSID?   That's not an  
 authenticated token.   Currently Windows makes security decisions  
 based on the SSID.   You could call this the best answer they could  
 come up with for a problem with no good answers.   Or you could say  
 that it instills the user with a false sense of security.   Either  
 way, it's not something I'd be comfortable seeing in a protocol spec, 
 so if the client is in fact to make decisions as you've
 suggested, we'd need a secure way of doing this.   I don't know  
 enough about WPA Enterprise to know if there's a bidirectional 
 authentication going on there - from the UI perspective it looks like 
 it's one-way.



-
This transmission (including any attachments) may contain confidential 
information, privileged material (including material protected by the 
solicitor-client or other applicable privileges), or constitute non-public 
information. Any use of this information by anyone other than the intended 
recipient is prohibited. If you have received this transmission in error, 
please immediately reply to the sender and delete this information from your 
system. Use, dissemination, distribution, or reproduction of this transmission 
by unintended recipients is not authorized and may be unlawful.
___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


Re: [Gen-art] Request for comments regarding SEED-SRTP

2009-04-16 Thread Elwyn Davies
Hi, Seokung.

For section 2.2, I *still* think it would be good to be totally explicit
as I said: Something like:
- At the sender: perform step 7 before step 5.
- At the receiver: perform the second half of step 5 (perform
verification) after step 6.
This means that authentication is performed on the cleartext rather than
the ciphertext.

Presumably this applies equally to SRTCP? You should say so if it is true.

It occurs to me (belatedly) that this reordering apparently increases
the processing that has to be done on packets before the authentication
is verified, providing a greater impact for a DoS attack that modifies
the encrypted payload. I think this should be noted in the security
considerations (assuming I am correct). Is this a significant problem
given encryption is mandatory on some packets?

The other problem was fixed.

Regards,
Elwyn



David McGrew wrote:
 Hi Seokung

 It looks like almost all of my comments were addressed. I did notice a
 couple things, though. The first is important, the second is very minor.


 There is no definition of how CCM and GCM are to be used to protect
 RTCP. It would not be possible to use this specification to protect
 RTCP packets with those algorithms. 

 The new draft says In case of SRTCP, the Authentication Portion
 described in Fig.2 of [RFC3711] is treated as AAD. Is that true even
 if the E bit is equal zero? I suspect that what you want here is to
 have a definition such that, when E=0, the AAD format for SRTCP is
 specified differently. (Either that or a restriction to not use E=0.)



 In Section 2, I don't understand the meaning of and valuables and I
 suggest just removing the phrase.


 I notice that the word is still there. Perhaps variables was the
 intended word?

 Apologies for the lag in my getting this review done.

 Best regards,

 David


 On Apr 2, 2009, at 6:14 AM, 윤석웅 wrote:

 Dear David Mcgrew and Elwyn Davies.


 Thanks for your lots of comments during AD last call.

 I really appreciated it.


 Here is the revised draft to reflect whole your comments.

 Please check if thers is any problem or deficiency.


 If you are OK, I will submit it to proceed next step.


 BR,

 Seokung

 draft-ietf-avt-seed-srtp-10(alpha).txt



___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] Assignments for April 23, 2009 Telechat

2009-04-16 Thread Mary Barnes
Hi all,

Here's the link to the summary of assignments for the April 23, 2009
telechat:
http://www.softarmor.com/rai/temp-gen-art/reviewers-090423.html

With the updated spreadsheets:
http://www.softarmor.com/rai/temp-gen-art/gen-art.html
http://www.softarmor.com/rai/temp-gen-art/gen-art-by-reviewer.html

For your convenience, the review boilerplate template is included below.

Note that reviews should ideally be posted to the gen-art mailing list
by COB on Tuesday:
http://www.alvestrand.no/ietf/gen/art/review-guidelines.html


Mary.

---

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document:
Reviewer:
Review Date: 
IESG Telechat date: 23 April 2009

Summary:

Major issues:
Minor issues:
Nits/editorial comments:






___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] A *new* batch of IETF LC reviews - 16 April 2009

2009-04-16 Thread Mary Barnes
Hi all,
 
Here's the link to the new LC assignments for this week: 
http://www.softarmor.com/rai/temp-gen-art/reviewers-090416-lc.html 

The assignments are captured in the spreadsheets: 
http://www.softarmor.com/rai/temp-gen-art/gen-art.html 
http://www.softarmor.com/rai/temp-gen-art/gen-art-by-reviewer.html 

The standard template is included below. 
Thanks, 
Mary. 

--- 
I have been selected as the General Area Review Team (Gen-ART) 
reviewer for this draft (for background on Gen-ART, please see 
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html). 

Please resolve these comments along with any other Last Call comments 
you may receive. 

Document: 
Reviewer: 
Review Date: 
IETF LC End Date: 
IESG Telechat date: (if known) 

Summary: 

Major issues: 

Minor issues: 

Nits/editorial comments: 















___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art


[Gen-art] Retry: Gen-ART review of draft-ietf-tcpm-tcpsecure-11.txt

2009-04-16 Thread Brian E Carpenter
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-tcpm-tcpsecure-11.txt
Reviewer: Brian Carpenter
Review Date: 2009-04-17
IETF LC End Date: 2009-04-16
IESG Telechat date: 2009-04-23

Summary:  Ready (minor comments)


Comments: 
- 

This draft is clear and well explained. I have no comments
that would block approval. The authors have agreed to the editorial
comments.

There's a reference in the Acknowledgements to some interoperability 
testing, which I understood took place about 5 years ago. This is
good news since the draft changes some very basic host behaviour. 
I wonder whether it might not be useful for this rather special case to 
file an interop report, even though that is not required for PS?

Editorial issues:
-

6.  Suggested Mitigation strengths

   As described in the above sections, recommendation levels for RST,
   SYN and DATA are tagged as SHOULD, SHOULD and MAY respectively.  The
   reason that DATA mitigation is tagged as MAY, even though it
   increased the TCP robustness in general is because, the DATA
   injection is perceived to be more difficult (twice less unlikely)
   when compared to RST and SYN counterparts.  

Surely that should be (twice as unlikely)? less unlikely seems
to be the opposite of more difficult.

There is at least one occurrence of it's where the word intended is its.

Randy Stewart's email address is wrong

Authors need to decide whether they need the pre-RFC5378 disclaimer for
any material they didn't contribute personally.

== Unused Reference: 'RFC3562' is defined on line 774, but no explicit
 reference was found in the text___
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art