Re: ARPOP_REQUEST with spoofed IP address (joe, turn it off!)

2002-07-23 Thread Lars Eggert

C. M. Heard wrote:
 How does one tell, in principle, that the source IP address (ar$spa) in
 an ARP packet is in fact spoofed?

Not without cryptographic authentication, in general.

But for this particular issue, not updating the local cache based on 
snooped ARP exchanges (i.e. what Linux does) may make sense. Also, under 
this particular misconfiguration, there'll very likely be two ARP 
responses for a lookup of the IP address in question, so maybe could be 
used as an indicator that there's a problem.

Lars
-- 
Lars Eggert [EMAIL PROTECTED]   USC Information Sciences Institute



smime.p7s
Description: S/MIME Cryptographic Signature


Re: Jabber BOF afterthoughts

2002-07-23 Thread Randall Gellens

At 1:06 PM -0500 7/20/02, Pete Resnick wrote:

  Anyway, given that they actually want to get work done under the
 auspices of the IETF, I see no justification for turning them away.

Given that this is a deployed product, I tend to agree.  The work is
going to get done; we may as well help it to get done as well as
possible.




Re: ARPOP_REQUEST with spoofed IP address (joe, turn it off!)

2002-07-23 Thread Vernon Schryver

 From: Lars Eggert [EMAIL PROTECTED]

  How does one tell, in principle, that the source IP address (ar$spa) in
  an ARP packet is in fact spoofed?

 Not without cryptographic authentication, in general.

 But for this particular issue, not updating the local cache based on 
 snooped ARP exchanges (i.e. what Linux does) may make sense. Also, under 
 this particular misconfiguration, there'll very likely be two ARP 
 responses for a lookup of the IP address in question, so maybe could be 
 used as an indicator that there's a problem.

If you ignore gratuitous ARP, then what happens when a station goes down
and then comes back up with a different MAC address?  That happens when
the station is given new hardware or in some fail-over schemes.


Vernon Schryver[EMAIL PROTECTED]




Re: ARPOP_REQUEST with spoofed IP address (joe, turn it off!)

2002-07-23 Thread Caitlin Bestler

On 7/23/02, Vernon Schryver wrote:

 From: Lars Eggert [EMAIL PROTECTED]

  How does one tell, in principle, that the source IP
  address (ar$spa) in an ARP packet is in fact spoofed?

 Not without cryptographic authentication, in general.

 But for this particular issue, not updating the local
 cache based on snooped ARP exchanges (i.e. what Linux
 does) may make sense. Also, under this particular
 misconfiguration, there'll very likely be two ARP
 responses for a lookup of the IP address in question, so
 maybe could be used as an indicator that there's a
 problem.

If you ignore gratuitous ARP, then what happens when a
station goes down and then comes back up with a different
MAC address?  That happens when the station is given new
hardware or in some fail-over schemes.



There are some simple confidence counter techniques that
would filter out most spoofs but still allow fail-overs.

Basically, you use some simple counters and state variables
to detect when an IP address is being repeatedly switched to
one MAC address, and then back to the original value.

When this is detected the original mac address could then be
queried to confirm that it indeed thought it was the IP
address in question (just in case this is some sort of
migration feature and the flip-flopping was valid).

You could probe the original MAC address on *any* change,
but that could prove nasty on a large subnet. Having a
designated ARP validator on a subnet might make sense if a
network administrator was trying to prevent unauthorized use
of IP addresses on their network.

It's much easier to deal with spoofed source IP addresses on
a network basis than from inside one host. At the network
level the source IP address can be cross-checked against the
physical link it arrived on. Even with automatic fail-over,
the network administrator should know where an IP address
*could* come from. This is especially true of the IP
addresses most worth stealing.




Re: Jabber BOF afterthoughts

2002-07-23 Thread Randy Bush

 Anyway, given that they actually want to get work done under the
 auspices of the IETF, I see no justification for turning them
 away.
 Given that this is a deployed product, I tend to agree.  The work
 is going to get done; we may as well help it to get done as well
 as possible.

i have no useful knowledge or opinion on the actual technical
subject, so my points may already have been answered.  but the
reasons given above seem sufficient to put us in the paperclip
standards making business.  i submit that relevance, expertise,
non-conflict with other standards groups, change control, etc. are
important criteria.

randy




Re: Jabber BOF afterthoughts

2002-07-23 Thread Dave Crocker

At 08:18 AM 7/23/2002 -0700, Randy Bush wrote:
  Anyway, given that they actually want to get work done under the
  auspices of the IETF, I see no justification for turning them
  away.
  Given that this is a deployed product, I tend to agree.  The work
  is going to get done; we may as well help it to get done as well
  as possible.

  but the
reasons given above seem sufficient to put us in the paperclip
standards making business.


Indeed.

Proven technical base, motivated workers and ready market for products 
using a specification.

Those certainly are a lousy basis for forming an IETF working group.

d/

--
Dave Crocker mailto:[EMAIL PROTECTED]
TribalWise, Inc. http://www.tribalwise.com
tel +1.408.246.8253; fax +1.408.850.1850




the way an I-D takes

2002-07-23 Thread Kai Kretschmann

Hi,

what further way goes a submitted and published internet draft after a 
short period of discussion?

In mid may we published a draft named draft-kretschmann-kai-
sighttp-00.txt and got at least some responses. After waiting for 6 
month the draft vanishes from the ietf sites, am I right? So what can 
one do to get this or any draft some steps forward?
I heared there is/was a ietf meeting, are there indepenend drafts 
discussed, too?

Any further ideas welcome, either by email or via our small discussion 
board below to limit the traffic here.

Thanks,
--
http://www.sighttp.org/




RE: ARPOP_REQUEST with spoofed IP address (joe, turn it off!)

2002-07-23 Thread Christian Huitema

   How does one tell, in principle, that the source IP 
 address (ar$spa) in
   an ARP packet is in fact spoofed?
 
  Not without cryptographic authentication, in general.
 
  But for this particular issue, not updating the local cache 
 based on 
  snooped ARP exchanges (i.e. what Linux does) may make 
 sense. Also, under 
  this particular misconfiguration, there'll very likely be two ARP 
  responses for a lookup of the IP address in question, so 
 maybe could be 
  used as an indicator that there's a problem.
 
 If you ignore gratuitous ARP, then what happens when a 
 station goes down
 and then comes back up with a different MAC address?  That 
 happens when
 the station is given new hardware or in some fail-over schemes.

Let's face it: ARP in insecure. The proposed heuristic don't really
help: there is no way to tell which of several ARP responses is the
real one. Not using gratuitous ARP helps somewhat, in the sense that
an attacker will have to expend more resources, but it also hurts,
because there will be no way to flush erroneous values from the ARP
cache. In any case, an attacker, or a misconfigured node, can easily
send ARP responses to ARP requests for a target address; indeed, it can
just as well respond to ping and other requests for that address. The
attacker's MAC address will end up in the cache, which won't be flushed
for some time...

Bottom line: if we want to run ARP in networks that are not protected by
some form of physical security, then we need to secure the protocol. I
don't know whether expending that energy on ARP is in fact a good idea,
since ARP is almost as old as IPv4, and we are moving to IPv6. But for
IPv6, there is no question: we should certainly develop a secure
vbersion of neighbor discovery.

-- Christian Huitema




Re: Jabber BOF afterthoughts

2002-07-23 Thread Randy Bush

 Anyway, given that they actually want to get work done under the
 auspices of the IETF, I see no justification for turning them
 away.
 Given that this is a deployed product, I tend to agree.  The work
 is going to get done; we may as well help it to get done as well
 as possible.
 but the reasons given above seem sufficient to put us in the paperclip
 standards making business.
 Proven technical base, motivated workers and ready market for products 
 using a specification.
 Those certainly are a lousy basis for forming an IETF working group.

you have an impressive talent for omitting text, twisting people's
words, etc.  you should run for political office.

i also said

 i submit that relevance, expertise, non-conflict with other
 standards groups, change control, etc. are important criteria.

randy




Re: the way an I-D takes

2002-07-23 Thread John Stracke

Kai Kretschmann wrote:

 what further way goes a submitted and published internet draft after a 
 short period of discussion? 

urn:ietf:rfc:2026

 In mid may we published a draft named draft-kretschmann-kai-
 sighttp-00.txt and got at least some responses.

...mostly negative, IIRC.

-- 
/\
|John Stracke|Principal Engineer |
|[EMAIL PROTECTED]   |Incentive Systems, Inc.|
|http://www.incentivesystems.com |My opinions are my own.|
||
|This is the .sig that says... Ni!   |
\/






Re: Jabber BOF afterthoughts

2002-07-23 Thread Randy Bush

 I certainly agree that relevance, expertise, change control, etc. are 
 important criteria for the IESG to review. I believe a review of the 
 discussion here and the minutes of the BOF session will reveal that 
 each of those criteria are well met

cool!

 However, I'm not clear why non-conflict with other standards groups 
 is a criteria. Care to explain?

sure.  i'll even do it for free!  :-)

we don't make ethernet standards, ieee does.  we don't make sdh
standards, itu does.  etc. etc.  in this case, i would be careful
not to encroach on w3's toes.  i have no idea if we would be or
not.

as to why we are careful not to step on other sdos' toes, well we
do not want them to step on ours.  there have been incidents of
this kind of issue with other sdos, and we try to be careful.  make
sense?

randy




Re: Jabber BOF afterthoughts

2002-07-23 Thread Dave Crocker

At 10:01 AM 7/23/2002 -0700, Randy Bush wrote:
  Proven technical base, motivated workers and ready market for products
  using a specification.
  Those certainly are a lousy basis for forming an IETF working group.

you have an impressive talent for omitting text, twisting people's
words, etc.  you should run for political office.

i also said

  i submit that relevance, expertise, non-conflict with other
  standards groups, change control, etc. are important criteria.

Randy,

Thanks for the ad hominem.  For my own part, I had refrained from noting 
your own accomplishment at invention.

There was nothing in the note you were supposedly responding to that hinted 
at the IETF's being a rubber stamp, yet that is the interpretation that you 
chose to create for it.

And you forgot to note that besides being ignorant of the technical issues, 
you apparently had no knowledge of the process-related history of this and 
were, therefore, ignorant of the fact that all of the issues you were 
voicing concern about had been addressed quite thoroughly.

Yet still you chose to post such a constructive, informed note.

Silly me, I thought area directors were expected to be careful about their 
activities concerning a matter they will be expected to pass judgement on, 
especially one about which there has already been such stellar, public IETF 
process achievement.

d/


--
Dave Crocker mailto:[EMAIL PROTECTED]
TribalWise, Inc. http://www.tribalwise.com
tel +1.408.246.8253; fax +1.408.850.1850




Re: Jabber BOF afterthoughts

2002-07-23 Thread Randy Bush

thanks for your ever-constructive contribution dave.

for actual content, see my conversation with pete.

randy




Re: Jabber BOF afterthoughts

2002-07-23 Thread Graham Klyne

At 08:18 AM 7/23/02 -0700, Randy Bush wrote:
...  i submit that relevance, expertise,
non-conflict with other standards groups, change control, etc. are
important criteria.

Mostly, that seems quite reasonable.  But I'm interested to understand what 
constitutes non conflict here.

#g


---
Graham Klyne
[EMAIL PROTECTED]




Re: Jabber BOF afterthoughts

2002-07-23 Thread Randy Bush

 Mostly, that seems quite reasonable.  But I'm interested to understand
 what constitutes non conflict here.

was my reply to pete on this sufficiently helpful?  if not, i will
beg the help of our sdo lawyers like scott, so you had better be
happy with what i said :-).

sometimes we have X come to us to move their work through our
process after they have not gotten what they wanted from the more
appropriate sdo.  so, if we were to take it on, we could be badly
stepping on someone else's turf.  what goes around comes around,
and we don't want sdo turf wars.  do we want itu to 'help' with
smtp?

i have no idea if this is an issue here, as i am not in contact
with w3c or whomever else.  i expect you, pete, etc. will know far
better than i if we are nearing hot water here.  i am just asking
you to please be conscious of the issue.

fwiw i have nothing against jabber.  some of my best friends jabber
:-).  i am even trying to get a secure jabber server working (and
am hitting problems).  i am just concerned about process and
precedent.

randy




Re: Jabber BOF afterthoughts

2002-07-23 Thread John Stracke

Randy Bush wrote:

we don't make ethernet standards, ieee does.  we don't make sdh
standards, itu does.  etc. etc.  in this case, i would be careful
not to encroach on w3's toes.
  

What would Jabber have to do with the W3C? It's a protocol, not a 
document format.  Furthermore, we already have two efforts in this 
space; if the W3C were likely to object, they would've by now.

-- 
/\
|John Stracke|Principal Engineer |
|[EMAIL PROTECTED]   |Incentive Systems, Inc.|
|http://www.incentivesystems.com |My opinions are my own.|
||
|This is the .sig that says... Ni!   |
\/






Re: the way an I-D takes

2002-07-23 Thread John Stracke

John Stracke wrote:

 Kai Kretschmann wrote:

 In mid may we published a draft named draft-kretschmann-kai-
 sighttp-00.txt and got at least some responses.

 ...mostly negative, IIRC.

checks archive OK, this was an unworthy bit of snideness, since nearly 
all the previous comments came from me.  Sorry.

-- 
/\
|John Stracke|Principal Engineer |
|[EMAIL PROTECTED]   |Incentive Systems, Inc.|
|http://www.incentivesystems.com |My opinions are my own.|
||
|This is the .sig that says... Ni!   |
\/







Re: Jabber BOF afterthoughts

2002-07-23 Thread Marshall Rose

randy - hi. i'm a little confused about the exchanges this morning, so bear
with me.


 i have no idea if this is an issue here, as i am not in contact
 with w3c or whomever else.  i expect you, pete, etc. will know far
 better than i if we are nearing hot water here.  i am just asking
 you to please be conscious of the issue.

this is a fair point. there is no w3c effort on instant messaging, while
soap is certainly a w3c effort, i think most folks would be hard-pressed to
find much overlap between it and jabber, other than the fact that they both
use xml at different points in their stack.


 fwiw i have nothing against jabber.  some of my best friends jabber
 :-).  i am even trying to get a secure jabber server working (and
 am hitting problems).  i am just concerned about process and
 precedent.

send me a private note explaining the difficulty, and maybe i can help.

/mtr





Re: Jabber BOF afterthoughts

2002-07-23 Thread Randy Bush

 On this point I'm in total agreement with Randy ... I've still have a 
 problem with this ...why come to IETF with this work ?

note that i do not have the expertise to have a position on this
with respect to jabber.  this whole sub-thread was really my
*process* reaction to randall's

 Given that this is a deployed product, I tend to agree.  The
 work is going to get done; we may as well help it to get done
 as well as possible.

being quite unbounded.  and i suggested some bounds

 relevance, expertise, non-conflict with other standards
 groups, change control, etc. are important criteria.

i was merely raising a formal process issue, and not necessarily an
issue i have with jabber per se.

 it is perfectly reasonable to kill off or delay WG charting
 because of the current IESG work load, especially in the
 applications area.

i don't buy this.  if the wannabe-wg is appropriate ietf work, the
folk are there with their homework done and ready to roll, the
drafts are in play with change control in the ietf, there is an
active constructive mailing list, and a charter is close to being
good, then iesg load is no excuse.  if this is a problem, then we
need to, and will, fix it.

randy




Re: Jabber BOF afterthoughts

2002-07-23 Thread Randy Bush

 we don't make ethernet standards, ieee does.  we don't make sdh
 standards, itu does.  etc. etc.  in this case, i would be careful
 not to encroach on w3's toes.
 What would Jabber have to do with the W3C? It's a protocol, not a 
 document format.  Furthermore, we already have two efforts in this 
 space; if the W3C were likely to object, they would've by now.

i do not know how much clearer i could be than

 i have no idea if this is an issue here, as i am not in contact
 with w3c or whomever else.  i expect you, pete, etc. will know
 far better than i if we are nearing hot water here.  i am just
 asking you to please be conscious of the issue.

randy




Re: the way an I-D takes

2002-07-23 Thread Fred Baker

At 06:25 PM 7/23/2002 +0200, Kai Kretschmann wrote:
what further way goes a submitted and published internet draft after a 
short period of discussion?

That largely depends on you. If it goes into a working group, it becomes a 
working group document which you might be the editor of or a contributor 
to. If it remains a personal submission, you can ask the IESG to publish it 
as an informational RFC. But yes, if you do nothing, it will age out in time.

Question for you on the content of the draft. What you are proposing is, I 
think, signing web pages as a way to detect when they have been hacked.

You state that the public key needs to come through a third party. I'm not 
sure I buy that. If you have a business relationship, you could transfer 
the public key (in a certificate) during the process of setting it up.

You are concerned about transfer of the key at the time because the hacker 
might substitute a different public key. What I would worry about is the 
system signing dynamic pages on the fly and therefore using its private key 
to sign hacked files. How would you address that?




Re: Jabber BOF afterthoughts

2002-07-23 Thread Pete Resnick

On 7/23/02 at 10:09 AM -0700, Randy Bush wrote:

we don't make ethernet standards, ieee does.  we don't make sdh 
standards, itu does.  etc. etc.

Ah, you're talking about competing with other standards bodies, not 
groups within the IETF! OK, that I understand.

in this case, i would be careful not to encroach on w3's toes.  i 
have no idea if we would be or not.

Everything that I've seen indicates nothing in any of the potential 
work items which would step on any W3C toes. So I think Jabber is 
cool there too.

as to why we are careful not to step on other sdos' toes, well we do 
not want them to step on ours.  there have been incidents of this 
kind of issue with other sdos, and we try to be careful.  make sense?

Absolutely.

pr
-- 
Pete Resnick mailto:[EMAIL PROTECTED]
QUALCOMM Incorporated - Direct phone: (858)651-4478, Fax: (858)651-1102




Re: Jabber BOF afterthoughts

2002-07-23 Thread Graham Klyne

At 10:43 AM 7/23/02 -0700, Randy Bush wrote:
fwiw i have nothing against jabber.  some of my best friends jabber
:-).  i am even trying to get a secure jabber server working (and
am hitting problems).  i am just concerned about process and
precedent.

In the IETF that I know, the issue is not so much one of process and 
precedent, but core competence.  And if that isn't clear, or is distributed 
across organizations, there are plenty of examples of collaborative efforts.

#g


---
Graham Klyne
[EMAIL PROTECTED]




Re: Jabber BOF afterthoughts

2002-07-23 Thread Richard Shockey



sometimes we have X come to us to move their work through our
process after they have not gotten what they wanted from the more
appropriate sdo.  so, if we were to take it on, we could be badly
stepping on someone else's turf.  what goes around comes around,
and we don't want sdo turf wars.  do we want itu to 'help' with
smtp?

On this point I'm in total agreement with Randy ... I've still have a
problem with this ...why come to IETF with this work ?... this is XML
messaging ...why didnt the Jabber community choose OASIS or W3C..which
strikes me as a more logical home for these kind of things and there is a
larger community of XML expertise there.

Just because there is a community that has a good idea and wants to work on
it does not mean the IETF should take it on.  Randy is right about process
and precedent. we kill off BOF's all the time for any number of
irrational reasons even when there is a strongly committed core or people
willing to work the issue. And, contrary to popular opinion,  it is
perfectly reasonable to kill off or delay WG charting because of the
current IESG work load, especially in the applications area.

That said ..at the BOF the Jabber folks remarked and I pointed out that
there may be a larger issue of asynchronous XML messaging that may or may
not have relevance in the IETF.  Patrik's comments at the plenary were
quiet appropriate that we are beginning to deal with lots of XML things and
how we move these things around and where these fit into the general IETF
view of Architecture is rather relevant.

Jabber MAY or MAY NOT be part of that ..I don't know and I say that as a
certifiable SIP bigot and on that basis I'm personally willing to keep a
open mind on the issue.

I'm still trying to discover how Jabber might be complimentary to SIMPLE in
much the same way IMAP is complementary to POP3. ( ok maybe a bad analogy).

But I wish that those proponents of a Jabber WG would understand that some
of us in the SIP community have some real concerns about the effect or
perceptions in the marketplace that chartering this work in the IETF might
have. They are real and probably cloud our thinking ..but simply dismissing
them as irrelevant or stupid is not going to help gain consensus on
chartering this work.

I'll be real blunt here the difference between asynchronous XML messaging
and asynchronous XML signalling is really fine and that really worries me.

fwiw i have nothing against jabber.  some of my best friends jabber
:-).

ditto ...blabber, slobber depending on time of day..

i am even trying to get a secure jabber server working (and
am hitting problems).  i am just concerned about process and
precedent.




 
Richard Shockey, Senior Manager, Strategic Technology Initiatives
NeuStar Inc.
45980 Center Oak Plaza   Bldg 8 Sterling, VA  20166
1120 Vermont Ave NW Suite 400 Washington DC 20005
Voice +1 571.434.5651 Cell : +1 314.503.0640,  Fax: +1 815.333.1237
mailto: [EMAIL PROTECTED] or
mailto: [EMAIL PROTECTED]
http://www.neustar.biz
http://www.enum.org





Re: Jabber BOF afterthoughts

2002-07-23 Thread Marshall Rose

[ lots of stuff deleted that was designed to distract... ]

 But I wish that those proponents of a Jabber WG would understand that some
 of us in the SIP community have some real concerns about the effect or
 perceptions in the marketplace that chartering this work in the IETF might
 have. They are real and probably cloud our thinking ..but simply
dismissing
 them as irrelevant or stupid is not going to help gain consensus on
 chartering this work.

richard - whether simple succeeds or fails will have nothing to do with
whether the ietf helps out the jabber folks. each will succeed or fail on
their own merits.

i am at a loss to understand the extraordinary amount of fear and loathing
from the simple camp that i witnessed in the jabber bof. i could be more
unkind here, but i'm making an extraordinary effort to be inoffensive.

regardless, there are numerous precedents to invalidate your position that
we can work on only one. the most obvious is cpim, which explicitly
acknowledges the existence of many.

however, if you insist that there can be only one, then perhaps the logical
thing to do is for the iesg to put eveything on hold while we do a detailed
analysis of the technical merits of the various approaches.

oh, wait, we already did that, and the result was that we did cpim. go back
two paragraphs.

for myself, i think that the simple folks would be much better served by
focusing on their work product than on political posturing.

/mtr





how to take minutes

2002-07-23 Thread Randy Presuhn

Hi -

Relatively few WG minute takers pay much
attention to the Mortimer/Agnes/Duane bullet in
http://www.ietf.org/instructions/minutes.html

Is it time to update the web page to reflect actual practice?

Might it be easier to get people to take minutes if they
realized that we're not asking for blow-by-blow transcripts?

Some of these meeting notes that capture (some of) the words
but miss the point of the discussion.

 --
 Randy Presuhn  BMC Software, Inc.  1-3141
 [EMAIL PROTECTED]  2141 North First Street
 Tel: +1 408 546-1006   San José, California 95131  USA
 --
 My opinions and BMC's are independent variables.
 --




Re: Jabber BOF afterthoughts

2002-07-23 Thread Valdis . Kletnieks

On Tue, 23 Jul 2002 23:21:40 BST, Lloyd Wood said:

 XML! XML! it's XML! whatever happened to Java?

Any hammer, once it's used for pounding enough screws and bolts, starts
looking rather dented and abused.  The obvious solution is to buy an new
bright shiny hammer with which to pound screws and bolts.

(Note - I think XML and Java are both *wonderful* for certain tasks - but
if there's anything I've learned in 20+ years of this, it's that *nothing*
is The Next Great Thing To Fix Everything)
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg08899/pgp0.pgp
Description: PGP signature


ECN and ISOC: request for help...

2002-07-23 Thread Franck Martin

In its great wisdom, the IETF has divised a system to control congestion
over the Internet called ECN [RFC3168], unfortunately there are still some
routers out there which are Explicit Congestion Notification (ECN) broken:

http://urchin.earth.li/cgi-bin/ecn.pl

One of this router leads to the ISOC web site. what is funny is to see the
above RFC is copyright ISOC. Could someone located in the Washington DC area
please contact the ISOC people and help them to be RFC compliant...

I have highlighted to ISOC the problem, they are aware, but understaffed and
this is a little bit tricky, but it should be a piece of cake for the IETF
members.

More info on ECN: 
http://urchin.earth.li/ecn/
http://www.icir.org/floyd/ecn.html
http://www.rfc-editor.org/rfc/rfc3168.txt

Franck Martin
Network and Database Development Officer
SOPAC South Pacific Applied Geoscience Commission
Fiji
E-mail: [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 
Web site: http://www.sopac.org/
http://www.sopac.org/ Support FMaps: http://fmaps.sourceforge.net/
http://fmaps.sourceforge.net/ 
Certificate: https://www.sopac.org/ssl/ 

This e-mail is intended for its addresses only. Do not forward this e-mail
without approval. The views expressed in this e-mail may not be necessarily
the views of SOPAC.




Re: how to take minutes

2002-07-23 Thread Scott Brim

On Tue, Jul 23, 2002 05:54:25PM -0700, Randy Presuhn allegedly wrote:
 Hi -
 
 Relatively few WG minute takers pay much
 attention to the Mortimer/Agnes/Duane bullet in
 http://www.ietf.org/instructions/minutes.html
 
 Is it time to update the web page to reflect actual practice?
 
 Might it be easier to get people to take minutes if they
 realized that we're not asking for blow-by-blow transcripts?
 
 Some of these meeting notes that capture (some of) the words
 but miss the point of the discussion.

That last point is a useful one, but when I can't be at a meeting I
strongly prefer blow-by-blow transcripts, even babbling, over just
results.  I want Meeting Notes with enough detail that I can pick out
the motivations and other nuances.  Minutes, for the Proceedings,
should not exclude them.  

Sure, let's update some web page, and perhaps an RFC.

Thanks ... Scott




RE: ECN and ISOC: request for help...

2002-07-23 Thread Gary E. Miller

Yo Christian!

Actually, RFC 3168 has nothing to do with it.  The issue is RFC 793.

RFC 793 is a Standard, not a Proposed Standard

RFC 793 lists the bits later used by ECN as Reserved.  Computer programs
are supposed to ignore Reserved bits unless they really know what
they are doing.

If a router treats bits in the header as required by the STANDARD RFC
793 then RFC 3168 will cause no harm.I do not have a copy of Baker
handy, but I bet it agrees.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

On Tue, 23 Jul 2002, Christian Huitema wrote:

 So, if you are on a campaign to promote ECN, then maybe you should first
 try to promote this specification to the next standard level... You may
 also want to take a stab at revising the Requirements for IP Version 4
 Routers; the last edition, RFC 1812 by Fred Baker, dates from June
 1995.




RE: ECN and ISOC: request for help...

2002-07-23 Thread Christian Huitema


 One of this router leads to the ISOC web site. what is funny is to see
the
 above RFC is copyright ISOC. Could someone located in the Washington
DC area
 please contact the ISOC people and help them to be RFC compliant...

Your reference to RFC compliance is somewhat mistaken. First, it
misrepresents what RFC compliance means: the FOO explains how to do FOO;
a system is compliant if it chooses to do FOO in a manner compatible
with the RFC, and non compliant if it chooses an incompatible variant;
however, a system that does not do FOO is neither compliant nor
non-compliant, it just does not do it. There is absolutely no IETF
mandate that all systems implement all RFC. 

Second, RFC 3168 is a Proposed Standard. To quote RFC 2026:

   Implementors should treat Proposed Standards as immature
   specifications.  It is desirable to implement them in order to gain
   experience and to validate, test, and clarify the specification.
   However, since the content of Proposed Standards may be changed if
   problems are found or better solutions are identified, deploying
   implementations of such standards into a disruption-sensitive
   environment is not recommended. 

So, if you are on a campaign to promote ECN, then maybe you should first
try to promote this specification to the next standard level... You may
also want to take a stab at revising the Requirements for IP Version 4
Routers; the last edition, RFC 1812 by Fred Baker, dates from June
1995.

-- Christian Huitema




RE: ECN and ISOC: request for help...

2002-07-23 Thread Franck Martin

I'm not in a campaign to promote ECN, or anything... I'm saying that ISOC
web site is not reachable if you enable ECN, which RFC793(standard) or
RFC3168(proposed Standard) talk about.

I don't want to talk about what is a standard or what is not... What is
compliant or not...

Will there be anybody to volunteer and fix the routers leading to ISOC web
site, mailing lists, e-mail addresses and so on?

This is what my message is all about. Please IETF members in Washington DC,
Area, please give a call to ISOC and offer some help...

This is embarrassing, that's all

Cheers.

Franck Martin
Network and Database Development Officer
SOPAC South Pacific Applied Geoscience Commission
Fiji
E-mail: [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 
Web site: http://www.sopac.org/
http://www.sopac.org/ Support FMaps: http://fmaps.sourceforge.net/
http://fmaps.sourceforge.net/ 
Certificate: https://www.sopac.org/ssl/ 

This e-mail is intended for its addresses only. Do not forward this e-mail
without approval. The views expressed in this e-mail may not be necessarily
the views of SOPAC.



-Original Message-
From: Gary E. Miller [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, 24 July 2002 3:02 
To: Christian Huitema
Cc: ietf
Subject: RE: ECN and ISOC: request for help...


Yo Christian!

Actually, RFC 3168 has nothing to do with it.  The issue is RFC 793.

RFC 793 is a Standard, not a Proposed Standard

RFC 793 lists the bits later used by ECN as Reserved.  Computer programs
are supposed to ignore Reserved bits unless they really know what
they are doing.

If a router treats bits in the header as required by the STANDARD RFC
793 then RFC 3168 will cause no harm.I do not have a copy of Baker
handy, but I bet it agrees.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

On Tue, 23 Jul 2002, Christian Huitema wrote:

 So, if you are on a campaign to promote ECN, then maybe you should first
 try to promote this specification to the next standard level... You may
 also want to take a stab at revising the Requirements for IP Version 4
 Routers; the last edition, RFC 1812 by Fred Baker, dates from June
 1995.




Re: how to take minutes

2002-07-23 Thread Pekka Savola

On Tue, 23 Jul 2002, Scott Brim wrote:
 On Tue, Jul 23, 2002 05:54:25PM -0700, Randy Presuhn allegedly wrote:
  Hi -
  
  Relatively few WG minute takers pay much
  attention to the Mortimer/Agnes/Duane bullet in
  http://www.ietf.org/instructions/minutes.html
  
  Is it time to update the web page to reflect actual practice?
  
  Might it be easier to get people to take minutes if they
  realized that we're not asking for blow-by-blow transcripts?
  
  Some of these meeting notes that capture (some of) the words
  but miss the point of the discussion.
 
 That last point is a useful one, but when I can't be at a meeting I
 strongly prefer blow-by-blow transcripts, even babbling, over just
 results.  I want Meeting Notes with enough detail that I can pick out
 the motivations and other nuances.  Minutes, for the Proceedings,
 should not exclude them.  

I haven't written minutes for any IETF meeting myself, so perhaps I 
shouldn't comment.  But on the page:

'They should not follow a Mortimer said, then Agnes said, then Duane
said, format, nor should they contain a detailed list of changes to a
document. While these forms may be helpful to the folks who actually
attend the sessions, they are less helpful to those who have a more
general interest in the groups' activities.'

This makes an implicit assumption that anyone reading minutes is only 
generally interested in the group's activities.

I thought attendance in meetings for w.g. members was not supposed to be
necessary in the IETF?

-- 
Pekka Savola Tell me of difficulties surmounted,
Netcore Oy   not those you stumble over and fall
Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords