Finding issue trackers for drafts

2006-01-30 Thread Elwyn Davies

Hi.

One additional piece of information relating to drafts that ism't 
included in the drafts database is the location of the issue tracker (if 
any).  They aren't all in one place at the moment which makes life more 
difficult than necessary for the casual inspector... for example...


- I was just faced with an email relating to a l2vpn document which I 
reviewed for the gen-art team which stated that 'there were some issues 
in the issue tracker' but no note of where I could locate the tracker.  
Now clearly I can bug the authors but I am sure they have better things 
to do.


- I know where to find some of the nsis issue trackers but I also know 
they aren't obvious to a casual observer.


So two thoughts:
- Could this information be collated on the info pages (subject to a 
good way of finding it out)?
- Would it be a good idea to incorporate the location of the issue 
tracker into drafts as a matter of course (might even encourage their use)?


xml2rfc might be able to provide some sort of support perhaps but that 
isn't essential.


Regards,
Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IETF65 hotel location

2006-01-30 Thread Ed Juskevicius
Dave Crocker write:
 the questionnaire will not serve to understand the needs
 of people who are *unable to attend*

Perhaps we should ask a more open-ended question (i.e. B below):

A) Did you attend IETF-65?
B) If not, why not?

Regards,

Ed 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Dave Crocker
Sent: Sunday, January 29, 2006 9:26 PM
To: Marshall Eubanks
Cc: ietf@ietf.org
Subject: Re: IETF65 hotel location




 However, to be constructive, I would like to suggest adding two yes or
 no questions to the next meeting questionnaire :
 
 A.) Do you feel that the venue chosen for the meeting was too remote, 
 in
 terms of accessibility of restaurants, bars, your or other hotels,
etc. ? 
 B.) (If A is answered yes.) Would having another IETF meeting in a
site
 that is similarly remote make it less likely that you would attend ? 


Asking questions like this could be quite useful.

The challenge is in making sure that the right people get asked.

If the questions are asked of people who already attended the meeting,
then the 
sampling is of people with the resources to accommodate the current
style of 
meeting arrangement.

While some might grouse about one characteristic or another of the
current 
choices, the questionnaire will not serve to understand the needs of
people who 
are *unable to attend* IETF meetings because of current costs, due to 
remoteness, hotel fees, or the like.

(By the way, the what will make it less likely you will attend type of

question is often interesting to ask, but is usually not a good
predictor of 
actual behavior.)

d/
-- 

Dave Crocker
Brandenburg InternetWorking
http://bbiw.net

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF65 hotel location

2006-01-30 Thread Marshall Eubanks

Dear Ed;

This might also be a useful question to ask; it might be better to  
make it multiple choice along the lines of

(B. If not, because of
- general expense
- registration fees
- difficulty in arranging visa's or other travel preparations
- interference from other meetings or work schedule
- location of the meeting city
- location of the meeting venue )

However, that wasn't quite what I was suggesting. I have heard this  
issue of nearby access to
stuff come up before, and I know some people consider it quite  
important, so much
so that certain locations might be ruled out just for only having  
venues that are too isolated in their urban context.


So, in the context of a location that may be considered isolated, I  
think it might be
useful to consider this an experiment, and judge the reaction of the  
community after
the meeting towards this variable. Note that this would require  
polling those who attended, rather than those

who did not.

Regards
Marshall


On Jan 30, 2006, at 8:59 AM, Ed Juskevicius wrote:


Dave Crocker write:

the questionnaire will not serve to understand the needs
of people who are *unable to attend*


Perhaps we should ask a more open-ended question (i.e. B below):

A) Did you attend IETF-65?
B) If not, why not?

Regards,

Ed

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On  
Behalf Of

Dave Crocker
Sent: Sunday, January 29, 2006 9:26 PM
To: Marshall Eubanks
Cc: ietf@ietf.org
Subject: Re: IETF65 hotel location




However, to be constructive, I would like to suggest adding two  
yes or

no questions to the next meeting questionnaire :

A.) Do you feel that the venue chosen for the meeting was too remote,
in
terms of accessibility of restaurants, bars, your or other hotels,

etc. ? 

B.) (If A is answered yes.) Would having another IETF meeting in a

site
that is similarly remote make it less likely that you would  
attend ? 



Asking questions like this could be quite useful.

The challenge is in making sure that the right people get asked.

If the questions are asked of people who already attended the meeting,
then the
sampling is of people with the resources to accommodate the current
style of
meeting arrangement.

While some might grouse about one characteristic or another of the
current
choices, the questionnaire will not serve to understand the needs of
people who
are *unable to attend* IETF meetings because of current costs, due to
remoteness, hotel fees, or the like.

(By the way, the what will make it less likely you will attend  
type of


question is often interesting to ask, but is usually not a good
predictor of
actual behavior.)

d/
--

Dave Crocker
Brandenburg InternetWorking
http://bbiw.net

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IETF65 hotel location

2006-01-30 Thread Gray, Eric
David,

As I understand it, it would be a man-in-the-middle
attack if you sat at a table and ordered a Burrito from a
person you thought was a waiter.  That person then goes to
the counter, orders two burritos and a large coffee, to go.
They then deliver one Burrito to you, along with the bill,
and takes the other Burrito and the coffee with them. 

What you describe is more like high-jacking the 
transport mechanism...

--
Eric

-- -Original Message-
-- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
-- On Behalf Of David B Harrington
-- Sent: Saturday, January 28, 2006 1:12 PM
-- To: 'Spencer Dawkins'; ietf@ietf.org
-- Subject: RE: IETF65 hotel location
-- 
-- Hi,
-- 
-- This conversation of the IETF65 location started with an issue of
-- security.
-- 
-- I'd like to get this discussion back on track.
-- What are the security requirements for a distributed burrito
-- processing protocol?
-- If you are traveling from the conference hotel to a 
-- restaurant and are
-- mugged, is that considered a man-in-the-middle attack?
-- 
-- dbh
-- 
--  -Original Message-
--  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
--  Behalf Of Spencer Dawkins
--  Sent: Friday, January 27, 2006 3:26 PM
--  To: ietf@ietf.org
--  Subject: Re: IETF65 hotel location
--  
--  Hi, Mike,
--  
--   If we could morph it into a signup system that 
-- distributed people
--   according to restauant capacity and avoided the problem 
--  that someone
--   says I hear there's a burrito place on X street and a herd of
-- 300
--   IETFers shows up there, since they don't know any other 
--  places to go,
--   then you'd really have something.
--  
--   I'm afraid it's beyond IETF's expertise to come up with
--   distributed burrito processing protocols.
--  
--   Mike
--  
--  If you think about this for a minute, you would realize that 
--  (1) we not only 
--  have protocols for this, but we have running code, and (2) 
--  too much focus 
--  on distributed burrito processing might explain a lot about 
--  where we are 
--  and how we got here! :-)
--  
--  Thanks,
--  
--  Spencer, who is wondering what a dining protocol designers 
--  multitasking 
--  algorithm might look like, with a burrito between every pair 
--  of protocol 
--  designers (with apologies to the dining philosophers) 
--  
--  
--  
--  ___
--  Ietf mailing list
--  Ietf@ietf.org
--  https://www1.ietf.org/mailman/listinfo/ietf
--  
-- 
-- 
-- 
-- ___
-- Ietf mailing list
-- Ietf@ietf.org
-- https://www1.ietf.org/mailman/listinfo/ietf
-- 

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Meeting Survey Results

2006-01-30 Thread JORDI PALET MARTINEZ
Hi David,

I'm not really sure if we are able to completely understand each other, may
be my fault with my poor English.

I'm not saying anyone is enforcing one or the other protocol, I just say
that it may be wrong to assume, even if we believe that a is better, that
it will work if almost everyone move to a. And then we will have
recommended everyone to invest in something that was not so useful ...

I'm not enforcing the NOC to make a b/g network, especially once has been
explained why a seems to be better. On the other way around, I'm sure that
they are doing the best that can be done, absolutely no doubt on that.

Once more, some times providing details could be more helpful than just
decisions w/o explanations about why.

Let's close this here, please.

Regards,
Jordi




 De: David Kessens [EMAIL PROTECTED]
 Responder a: [EMAIL PROTECTED]
 Fecha: Wed, 25 Jan 2006 19:03:01 -0800
 Para: JORDI PALET MARTINEZ [EMAIL PROTECTED]
 CC: ietf@ietf.org ietf@ietf.org
 Asunto: Re: Meeting Survey Results
 
 
 Jordi,
 
 On Wed, Jan 25, 2006 at 05:47:17PM -0400, JORDI PALET MARTINEZ wrote:
 
 I understand your point, which somehow has been replied by some other
 comments in the list such as:
 
 - Is not so clear that this technology (a) will still work if all use it.
 - We are asking to change to 75% of the attendees.
 
 I don't understand why you keep harping on this issue that only exists
 because you have misread our announcement.
 
 We have been very forthcoming and clear why we like people to bring
 802.11a cards.
 
 We are not forcing anybody to use 802.11a and there is absolutely no
 talk of not providing 802.11b wireless access. We *RECOMMEND* that
 people bring and use 802.11a gear because we believe that *EVERYBODY*,
 including people who only have 802.11b cards, will have a better
 network experience.
 
 The only thing that we should have mentioned, but that we overlooked
 as most cards/dongles on the market now do 802.11a,bg, is that we
 don't recommend to leave your 802.11b equipment at home. The hotel is
 very large and there will be areas in the fringes that will have
 better 802.11b coverage or that are only covered by the hotels own
 802.11b service.
 
 - 50USD may be a lot for some people.
 
 You can easily get cards *LESS* than US$50. It is your judgement call
 whether you believe that this investment is worth it. Don't buy a
 802.11a card/dongle if you think it is too much. Nobody forces you to
 buy one.
 
 David Kessens
 ---
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf




**
The IPv6 Portal: http://www.ipv6tf.org

Barcelona 2005 Global IPv6 Summit
Slides available at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the use of the 
individual(s) named above. If you are not the intended recipient be aware that 
any disclosure, copying, distribution or use of the contents of this 
information, including attached files, is prohibited.




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Interim meetings planning [was Softwires Interim Meeting]

2006-01-30 Thread JORDI PALET MARTINEZ
Hi John,

Thanks for your input. See below, in-line.

Regards,
Jordi




 De: John C Klensin [EMAIL PROTECTED]
 Responder a: [EMAIL PROTECTED]
 Fecha: Thu, 26 Jan 2006 16:53:51 -0500
 Para: [EMAIL PROTECTED]
 CC: ietf@ietf.org ietf@ietf.org
 Asunto: Re: Interim meetings planning [was Softwires Interim Meeting]
 
 Jordi,
 
 Let me make a very general observation, based on my experience
 with the IETF.
 
 Where administrative procedures are concerned, the IETF
 functions well when the IESG is given general guidance by the
 community but then applies good judgment and discretion to the
 situations that arise.  If the community observes that the
 IESG's judgment is not good enough, we readjust the general
 guidance -- by complaints to individual ADs, by notes to the
 IESG, by discussion on the IETF list, or even via appeals if
 that is needed.  If one or more specific ADs regularly abuse
 that discretionary authority, they get abused in return on
 mailing lists, in plenaries, in discussions with nomcoms, and,
 if necessary, by recalls or at least serious discussions of
 recalls.  

Agree, but I feel that there is a lack of administrative procedure here,
which already caused some troubles. I'm trying to avoid repeating mistakes,
improving the guidance and making sure the process is more open and fair.

I fear that in this kind of situation (an Interim meeting unfairly setup),
an appeal will not sort out the problem.

 
 By contrast, when we try to write down the specific rules that
 should be applied, or the list of rules or steps they should use
 in making decisions, and try to reach consensus on them, two
 things happen, and happen over and over again:
 
 (1) We spend (I would say waste, but you may
 reasonably disagree) a huge amount of time discussing
 both the details of the proposals and whether or not the
 proposals are appropriate.  In my personal opinion, the
 IETF would be a better and more effective place to get
 work done if a higher percentage of the community's
 energy went into technical work than into discussions of
 procedural details.

Agree in that we need more people, and working more in technical documents,
but we like it or not, procedures are needed to make sure that the technical
work can be followed up. Otherwise, we may break our main rule: consensus,
not sure if say here also fairness.

 
 (2) We get the details wrong, resulting in more time
 being spent correcting the details of the rules that,
 IMO, we might have been better off not having in the
 first place.

I really much prefer to avoid problems when they may be too late to get
recovered. Details need to be put in place for that.

 
 In addition, if we get the details seriously wrong, the IESG has
 historically responded by applying a meta-rule.  That meta-rule
 is that their first obligation is to keep the IETF functioning.
 And, on that basis, once they conclude that whatever has been
 written down and established by consensus makes no sense, they
 simply ignore ignore it.   That action creates a very unhappy
 and unhealthy environment, whether it is appealed or not, but
 often may still be better than the alternative.

Not really sure if I've seen a case like the one that you describe, but
really doubt it may be the case for what I'm proposing.

 
 So, for a case like this, I suggest that you might want to have
 a conversation, with any AD you think is likely to listen, about
 whether the present guidance is sufficient and whether
 additional guidance or discussion would help.  ADs persuading
 other ADs about IESG matters and customs can be far more
 effective than any of us writing I-Ds to pin down details.  If
 there are no ADs with whom you feel that you can have such a
 conversation, then I think you need to chat with the Nomcom but
 I, at least, have generally found ADs to be receptive on these
 sorts of issues... even ADs with whom I generally don't get
 along well (not that there are any of those on the current IESG).

Agree, and indeed my proposal was the outcome of a few email exchange with
an AD ;-) He actually suggested to include this in the
venue-selection-criteria document, which for me, and also talking to others,
was not the best choice ...

 
 Let's try to avoid yet another round of stretched-out
 discussions on, e.g., how many days constitutes adequate notice,
 how to measure the accessibility of a location, what conditions
 are sufficient to justify an exception, and whatever other
 questions start to arise as soon as one tries to lock down
 specific rules.  If an interim meeting is announced that is
 likely to cause specific harm (as distinct from being an issue
 of principles about dates and locations), complain to the
 relevant AD and, if necessary, appeal the decision to approve
 the meeting.   But most of us, yourself certainly included, have
 more productive things to do with our time than starting another
 one of these procedural debate threads.
 
 Just my opinion, of course.

And thanks a lot for 

Re: IETF65 hotel location

2006-01-30 Thread Bob Braden

I don't understand why this discussion keeps going on and on, much
less why it started in the first place.

Folks, surely we have more important issues of Internet technology to
talk about, rather than jaw-boning about a task that we have delegated
to a competant organization.  That organization has in general done an
excellent job over the past many years, and I for one am confident they
will continue.  They are sensitive to input, but they get the job
done.  Site selection and contracting requires a difficult balancing
act to perform, between the ideal and the real.  As far as I can see,
they do a much better job of than the IETF could possibly hope for.  I
am thankful for their dedication and expertise.

Let's stop spending our resources micro-managing the Secretariat,
and deal with the problems that we are supposed to be solving.

Bob Braden


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF65 hotel location

2006-01-30 Thread John Levine
So, in the context of a location that may be considered isolated, I
think it might be useful to consider this an experiment, and judge
the reaction of the community after the meeting towards this
variable.

A reasonable question, but it probably needs to be picked out a little
more than that.  For us self-employed weenies, the price of the trip
is an issue, and part of the problem of isolated hotels is that they
tend to have restaurants where the burger costs $23.95 and takes an
hour to arrive.  In this case, there are cheaper hotels nearby, but
unless you want to eat at Denny's, the culinary and options are thin.

R's,
John


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF65 hotel location

2006-01-30 Thread Dave Crocker

Bob Braden wrote:

I don't understand why this discussion keeps going on and on, much
less why it started in the first place.


perhaps the difficulty is that you do not suffer from the problems being 
discussed.  that is fine for you, but it does not make the problems small or 
secondary.


when an issue is raised repeatedly, by many different people, it almost always 
has some degree of inherent legitimacy.  that makes it worth attending to.


some tactical problems have strategic impact. in this case, decisions which well 
might serve to make the ietf less inclusive ought to be taken seriously.


it used to be relatively easy and inexpensive to attend ietf meetings.  this no 
longer holds.  that excludes keeps potentially useful participants.


d/
--

Dave Crocker
Brandenburg InternetWorking
http://bbiw.net

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF65 hotel location

2006-01-30 Thread Daniel Senie

At 12:25 PM 1/30/2006, John Levine wrote:

So, in the context of a location that may be considered isolated, I
think it might be useful to consider this an experiment, and judge
the reaction of the community after the meeting towards this
variable.

A reasonable question, but it probably needs to be picked out a little
more than that.  For us self-employed weenies, the price of the trip
is an issue, and part of the problem of isolated hotels is that they
tend to have restaurants where the burger costs $23.95 and takes an
hour to arrive.  In this case, there are cheaper hotels nearby, but
unless you want to eat at Denny's, the culinary and options are thin.


I'll echo John's sentiments, also being self-employed. My IETF 
participation is spotty at best of late based on the expense.


Also being vegan, some locales can be especially difficult. (Memphis 
was sure a challenge). I still have a hard time thinking of a better 
place than Minneapolis in wintertime. The hotel costs weren't bad, 
and who knew Minneapolis was one of the most vegan and vegetarian 
friendly places in the US? 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF65 hotel location

2006-01-30 Thread JORDI PALET MARTINEZ
I've abstained myself to comment on this thread until now ... I prefer not
to judge until I actually visit the venue and see the real situation,
because it will be unfair to discover that this venue has been selected
being distant to downtown, when this was the excuse given to me for not
accepting Madrid, which has been proposed since 2001. Then we had San Diego,
which was a much better case, and I though it will never again happen ...
Will see ...

The point here is:
1) I agree with Dave: something that is being commented repeatedly ... Means
is not satisfying people and may be a real problem
2) Those that are expressing opinions on this thread, may be will like to
provide further inputs to a document in the scope of this thread, which has
been developed precisely to cope with this issues:
http://www.ietf.org/internet-drafts/draft-palet-ietf-meeting-venue-selection
-criteria-04.txt

Regards,
Jordi




 De: Dave Crocker [EMAIL PROTECTED]
 OrganizaciĆ³n: Brandenburg InternetWorking
 Responder a: [EMAIL PROTECTED]
 Fecha: Mon, 30 Jan 2006 10:41:08 -0800
 Para: Bob Braden [EMAIL PROTECTED]
 CC: ietf@ietf.org ietf@ietf.org
 Asunto: Re: IETF65 hotel location
 
 Bob Braden wrote:
 I don't understand why this discussion keeps going on and on, much
 less why it started in the first place.
 
 perhaps the difficulty is that you do not suffer from the problems being
 discussed.  that is fine for you, but it does not make the problems small or
 secondary.
 
 when an issue is raised repeatedly, by many different people, it almost always
 has some degree of inherent legitimacy.  that makes it worth attending to.
 
 some tactical problems have strategic impact. in this case, decisions which
 well 
 might serve to make the ietf less inclusive ought to be taken seriously.
 
 it used to be relatively easy and inexpensive to attend ietf meetings.  this
 no 
 longer holds.  that excludes keeps potentially useful participants.
 
 d/
 -- 
 
 Dave Crocker
 Brandenburg InternetWorking
 http://bbiw.net
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf




**
The IPv6 Portal: http://www.ipv6tf.org

Barcelona 2005 Global IPv6 Summit
Slides available at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the use of the 
individual(s) named above. If you are not the intended recipient be aware that 
any disclosure, copying, distribution or use of the contents of this 
information, including attached files, is prohibited.




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: I-D ACTION:draft-hartman-mailinglist-experiment-00.txt

2006-01-30 Thread Sam Hartman
 Joel == Joel M Halpern [EMAIL PROTECTED] writes:

Joel As I read the description of the experiment, when the IESG
Joel decides on the appropriate response to a specific case, they
Joel can decide whether that response is a single-list response
Joel or a multi-list response.

That was my intent.
Note there are roughly three responses:

1) Ban from list foo

2) Ban from list foo and bar but no others

3) Ban from list foo, and bar; lists in the set baz can also ban without iesg 
involvement.

I'd be happy to drop 3 as an option for this experiment if there is
community support.  I'd also be happy to keep 3 as an option.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Last Call: 'Multimedia Terminal Adapter (MTA) Management Information Base for PacketCable and IPCablecom compliant devices' to Proposed Standard

2006-01-30 Thread The IESG
The IESG has received a request from the IP over Cable Data Network WG to 
consider the following document:

- 'Multimedia Terminal Adapter (MTA) Management Information Base for 
   PacketCable and IPCablecom compliant devices '
   draft-ietf-ipcdn-pktc-mtamib-09.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-02-13.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-ipcdn-pktc-mtamib-09.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


RFC 4372 on Chargeable User Identity

2006-01-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.





RFC 4372

Title:  Chargeable User Identity 
Author: F. Adrangi,  A. Lior, 
J. Korhonen,  J. Loughney
Status: Standards Track
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED]
Pages:  10
Characters: 21555
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-radext-chargeable-user-id-06.txt

URL:http://www.rfc-editor.org/rfc/rfc4372.txt

This document describes a new Remote Authentication Dial-In User
Service (RADIUS) attribute, Chargeable-User-Identity.  This attribute
can be used by a home network to identify a user for the purpose of
roaming transactions that occur outside of the home network.  [STANDARDS TRACK]

This document is a product of the RADIUS EXTensions Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track protocol 
for the Internet community, and requests discussion and suggestions for 
improvements.  Please refer to the current edition of the Internet Official 
Protocol Standards (STD 1) for the standardization state and status of this 
protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...


A new Request for Comments is now available in online RFC libraries.





RFC 4372

Title:  Chargeable User Identity 
Author: F. Adrangi,  A. Lior, 
J. Korhonen,  J. Loughney
Status: Standards Track
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED],
[EMAIL PROTECTED]
Pages:  10
Characters: 21555
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-radext-chargeable-user-id-06.txt

URL:http://www.rfc-editor.org/rfc/rfc4372.txt

This document describes a new Remote Authentication Dial-In User
Service (RADIUS) attribute, Chargeable-User-Identity.  This attribute
can be used by a home network to identify a user for the purpose of
roaming transactions that occur outside of the home network.  [STANDARDS TRACK]

This document is a product of the RADIUS EXTensions Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track protocol 
for the Internet community, and requests discussion and suggestions for 
improvements.  Please refer to the current edition of the Internet Official 
Protocol Standards (STD 1) for the standardization state and status of this 
protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...

___
IETF-Announce mailing list
IETF-Announce@ietf.org

RFC 4369 on Definitions of Managed Objects for Internet Fibre Channel Protocol (iFCP)

2006-01-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.





RFC 4369

Title:  Definitions of Managed Objects for 
Internet Fibre Channel Protocol iFCP 
Author: K. Gibbons,  C. Monia, 
J. Tseng,  F. Travostino
Status: Standards Track
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED],  [EMAIL PROTECTED]
Pages:  29
Characters: 59354
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-ips-ifcp-mib-07.txt

URL:http://www.rfc-editor.org/rfc/rfc4369.txt

The iFCP protocol (RFC 4172) provides Fibre Channel fabric
functionality on an IP network in which TCP/IP switching and routing
elements replace Fibre Channel components.  The iFCP protocol is
used between iFCP Gateways.  This document provides a mechanism to
monitor and control iFCP Gateway instances, and their associated
sessions, using SNMP.  [STANDARDS TRACK]

This document is a product of the IP Storage Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track protocol 
for the Internet community, and requests discussion and suggestions for 
improvements.  Please refer to the current edition of the Internet Official 
Protocol Standards (STD 1) for the standardization state and status of this 
protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...


A new Request for Comments is now available in online RFC libraries.





RFC 4369

Title:  Definitions of Managed Objects for 
Internet Fibre Channel Protocol iFCP 
Author: K. Gibbons,  C. Monia, 
J. Tseng,  F. Travostino
Status: Standards Track
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED],  [EMAIL PROTECTED]
Pages:  29
Characters: 59354
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-ips-ifcp-mib-07.txt

URL:http://www.rfc-editor.org/rfc/rfc4369.txt

The iFCP protocol (RFC 4172) provides Fibre Channel fabric
functionality on an IP network in which TCP/IP switching and routing
elements replace Fibre Channel components.  The iFCP protocol is
used between iFCP Gateways.  This document provides a mechanism to
monitor and control iFCP Gateway instances, and their associated
sessions, using SNMP.  [STANDARDS TRACK]

This document is a product of the IP Storage Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track protocol 
for the Internet community, and requests discussion and suggestions for 
improvements.  Please refer to the current edition of the Internet Official 
Protocol Standards (STD 1) for the standardization state and status of this 
protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC

RFC 4373 on Lightweight Directory Access Protocol (LDAP) Bulk Update/Replication Protocol (LBURP)

2006-01-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.





RFC 4373

Title:  Lightweight Directory Access Protocol LDAP 
Bulk Update Replication Protocol LBURP 
Author: R. Harrison,  J. Sermersheim, 
Y. Dong
Status: Informational
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  16
Characters: 31091
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-rharrison-lburp-05.txt

URL:http://www.rfc-editor.org/rfc/rfc4373.txt

The Lightweight Directory Access Protocol (LDAP) Bulk
Update/Replication Protocol (LBURP) allows an LDAP client to perform
a bulk update to an LDAP server.  The protocol frames a sequenced
set of update operations within a pair of LDAP extended operations
to notify the server that the update operations in the framed set
are related in such a way that the ordering of all operations can be
preserved during processing even when they are sent asynchronously
by the client.  Update operations can be grouped within a single
protocol message to maximize the efficiency of client-server
communication.

The protocol is suitable for efficiently making a substantial set
of updates to the entries in an LDAP server.  This memo provides information 
for the Internet community.

INFORMATIONAL: This memo provides information for the Internet community. 
It does not specify an Internet standard of any kind.  
Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...


A new Request for Comments is now available in online RFC libraries.





RFC 4373

Title:  Lightweight Directory Access Protocol LDAP 
Bulk Update Replication Protocol LBURP 
Author: R. Harrison,  J. Sermersheim, 
Y. Dong
Status: Informational
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  16
Characters: 31091
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-rharrison-lburp-05.txt

URL:http://www.rfc-editor.org/rfc/rfc4373.txt

The Lightweight Directory Access Protocol (LDAP) Bulk
Update/Replication Protocol (LBURP) allows an LDAP client to perform
a bulk update to an LDAP server.  The protocol frames a sequenced
set of update operations within a pair of LDAP extended operations
to notify the server that the update operations in the framed set
are related in such a way that the ordering of all operations can be
preserved during processing even when they are sent asynchronously
by the client.  Update operations can be grouped within a single
protocol message to maximize the efficiency of client-server
communication.

The protocol is suitable for efficiently making a substantial set
of updates to the entries in an LDAP server.  This memo provides information 
for the Internet community.

INFORMATIONAL: This memo provides information for the Internet community. 
It does not specify an Internet standard of any kind.  
Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all 

RFC 4357 on Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms

2006-01-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.





RFC 4357

Title:  Additional Cryptographic Algorithms for Use 
with GOST 28147-89 GOST R 34 
10-94 GOST R 34 10-2001 and 
GOST R 34 11-94 Algorithms 
Author: V. Popov,  I. Kurepkin, 
S. Leontiev
Status: Informational
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  51
Characters: 114564
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-popov-cryptopro-cpalgs-04.txt

URL:http://www.rfc-editor.org/rfc/rfc4357.txt

This document describes the cryptographic algorithms and parameters
supplementary to the original GOST specifications, GOST 28147-89, GOST
R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94, for use in Internet
applications.  This memo provides information for the Internet community.

INFORMATIONAL: This memo provides information for the Internet community. 
It does not specify an Internet standard of any kind.  
Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...


A new Request for Comments is now available in online RFC libraries.





RFC 4357

Title:  Additional Cryptographic Algorithms for Use 
with GOST 28147-89 GOST R 34 
10-94 GOST R 34 10-2001 and 
GOST R 34 11-94 Algorithms 
Author: V. Popov,  I. Kurepkin, 
S. Leontiev
Status: Informational
Date:   January 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  51
Characters: 114564
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-popov-cryptopro-cpalgs-04.txt

URL:http://www.rfc-editor.org/rfc/rfc4357.txt

This document describes the cryptographic algorithms and parameters
supplementary to the original GOST specifications, GOST 28147-89, GOST
R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94, for use in Internet
applications.  This memo provides information for the Internet community.

INFORMATIONAL: This memo provides information for the Internet community. 
It does not specify an Internet standard of any kind.  
Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Last Call: 'Real-time Application Quality of Service Monitoring (RAQMON) Framework' to Proposed Standard

2006-01-30 Thread The IESG
The IESG has received a request from the Remote Network Monitoring WG to 
consider the following documents:

- 'Real-time Application Quality of Service Monitoring (RAQMON) MIB '
   draft-ietf-rmonmib-raqmon-mib-11.txt as a Proposed Standard
- 'Real-time Application Quality of Service Monitoring (RAQMON) Framework '
   draft-ietf-rmonmib-raqmon-framework-14.txt as a Proposed Standard
- 'Transport Mappings for Real-time Application Quality of Service Monitoring 
   (RAQMON) Protocol Data Unit (PDU) '
   draft-ietf-rmonmib-raqmon-pdu-12.txt as a Proposed Standard

   There is a potential overlap between the RAQMON protocol and
   the IPFIX and/or RTCP-XR work, but there are enough differences
   in applicability and complexity that this should not be
   a significant issue.  RAQMON is an extensible, distributed,
   SNMP-based monitoring system, integrated with the RMON
   family of MIB modules.  As such, it is intended to be applicable
   to many different types of protocols, that may run concurrently.  
   If a specialized protocol for VoIP monitoring is desired, then 
   RTCP-XR should probably be used instead.  If SNMP and/or 
   RMON integration are not desired, then IPFIX would be a
   suitable choice.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-02-13.

The files can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-rmonmib-raqmon-mib-11.txt
http://www.ietf.org/internet-drafts/draft-ietf-rmonmib-raqmon-framework-14.txt
http://www.ietf.org/internet-drafts/draft-ietf-rmonmib-raqmon-pdu-12.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce