Syslog inquiry, what is TAG delimiter with regard to RFC 3164

2006-04-06 Thread Johan Bosaeus
Hello,
We got a problem how to interpret the RFC 3164 document with respect to how to 
define the possible delimiters that can separate the TAG and CONTENT field. 
More specifically, is space a valid delimiter?

The part in RFC 3164 that supports space as a valid delimiter is in section 
4.1.3:

   The MSG part has two fields known as the TAG field and the CONTENT
   field.  The value in the TAG field will be the name of the program or
   process that generated the message.  The CONTENT contains the details
   of the message.  This has traditionally been a freeform message that
   gives some detailed information of the event.  The TAG is a string of
   ABNF alphanumeric characters that MUST NOT exceed 32 characters.  Any
   non-alphanumeric character will terminate the TAG field and will be
   assumed to be the starting character of the CONTENT field.  Most
   commonly, the first character of the CONTENT field that signifies the

   conclusion of the TAG field has been seen to be the left square
   bracket character ([), a colon character (:), or a space
   character.  This is explained in more detail in Section 5.3.


However, further down in the document you find evidence of the contrary, under 
5.4 Examples, a message where Use could be considered as the TAG:


  Example 2

Use the BFG!

   While this is a valid message, it has extraordinarily little useful
   information.  This message does not have any discernable PRI part. It
   does not contain a timestamp or any indication of the source of the
   message.  If this message is stored on paper or disk, subsequent
   review of the message will not yield anything of value.

   This example is obviously an original message from a device.  A relay
   MUST make changes to the message as described in Section 4.3 before
   forwarding it.  The resulting relayed message is shown below.

13Feb  5 17:32:18 10.0.0.99 Use the BFG!

   In this relayed message, the entire message has been treated as the
   CONTENT portion of the MSG part.  First, a valid PRI part has been
   added using the default priority value of 13.  Next, a TIMESTAMP has
   been added along with a HOSTNAME in the HEADER part.  Subsequent
   relays will not make any further changes to this message.  It should
   be noted in this example that the day of the month is less than 10.
   Since single digits in the date (5 in this case) are preceded by a
   space in the TIMESTAMP format, there are two spaces following the
   month in the TIMESTAMP before the day of the month.  Also, the relay
   appears to have no knowledge of the host name of the device sending
   the message so it has inserted the IPv4 address of the device into
   the HOSTNAME field.


What is the general understanding of this issue?

   Regards,
   Johan Bosaeus
Weird Solutions AB

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Stupid NAT tricks and how to stop them.

2006-04-06 Thread Peter Dambier

Anthony G. Atkielski wrote:

John Calcote writes:



I'll just jump in here for a second and mention also that vendors
offer what they have to, not what they can. They want to provide the
most bang for the buck, so to speak. These companies don't offer
the multiple-static-ip-address option today because most ISP's don't
offer it to home users and home (SOHO) users represent the target
market.



It is unlikely that ISPs will ever offer static IPs or multiple IPs to
home users at any time in the future for free.  They will continue to
charge heavy premiums for such professional features, with or
without IPv6.



http://www.manitu.de/

They offer you:

fixed IPv4 address with reverse lookup at 9.99 Euros per month.

You must have already T-DSL to use this servevice and you will
keep that. Means the 9.99 Euros get you a second PPPoE link over
your old modem and you can have a fixed plus a dynamic IPv4 address
at one and the same time.

t-online.de offer a similar service but it is more expensive.


--
Peter and Karin Dambier
The Public-Root Consortium
Graeffstrasse 14
D-64646 Heppenheim
+49(6252)671-788 (Telekom)
+49(179)108-3978 (O2 Genion)
+49(6252)750-308 (VoIP: sipgate.de)
mail: [EMAIL PROTECTED]
mail: [EMAIL PROTECTED]
http://iason.site.voila.fr/
https://sourceforge.net/projects/iason/


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Stupid NAT tricks and how to stop them.

2006-04-06 Thread Anthony G. Atkielski
Peter Dambier writes:

 http://www.manitu.de/

 They offer you:

 fixed IPv4 address with reverse lookup at 9.99 Euros per month.

I don't live in Germany.  The exception does not disprove the rule.




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


draft-ietf-dkim-threats-02 nit//Affects verification of messages?

2006-04-06 Thread Douglas Otis

,
|1.2.  Document Structure
|...
|
| The sections dealing with attacks on DKIM each begin with a table
| summarizing the postulated attacks in each category along with their
| expected impact and likelihood.  The following definitions were used
| as rough criteria for scoring the attacks:
|
| Impact:
|
|  High: Affects the verification of messages from an entire domain or
|  multiple domains
'

It is not clear what is meant by affects verification of messages.   
The verification process depends only upon the integrity of the  
network infrastructure.  The threat document should consider the  
impact upon the classification of a domain's messages.  Even when a  
private key is compromised, the verification process still passes  
valid messages.  The threat review indicates a compromised key as  
causing a high impact.  One could conclude this impact results when  
messages from a bad actor accrue to the exploited domain.


The introduction offers these possible uses of DKIM.
,
| Once the attesting party or parties have been established, the
| recipient may evaluate the message in the context of additional
| information such as locally-maintained whitelists, shared reputation
| services, and/or third-party accreditation.
'

A threat document should consider how an exploit might affect these  
uses of DKIM.



Change:

Affects the verification of messages...

to

Affects the classification of messages...

-Doug





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Copyright status of early RFCs

2006-04-06 Thread John Levine
A friend of mine wants to include copies of some early RFCs in a book.

My understanding is that anything published before 1976 without a
copyright notice, which would presumably include RFCs up through about
number 700, is in the public domain.

Does the IETF or IAB or RFC Editor take a position on this?

Regards,
John Levine, [EMAIL PROTECTED], Primary Perpetrator of The Internet for 
Dummies,
Information Superhighwayman wanna-be, http://www.johnlevine.com, Mayor
More Wiener schnitzel, please, said Tom, revealingly.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-ietf-pana-framework-06

2006-04-06 Thread Alper Yegin

Hi Bob,

I think the issue at hand is not the interpretation of text, but the
conflicting text in the 802.11i standard. David Nelson has already shed some
light to this.

Text in Clause 5 opens the door for non-802.1X protocols to utilize the
uncontrolled port, and we didn't find any limitations on what those
protocols may be -- hence concluded that PANA could be one of those. This is
where PANA WG came from. I'd not say this is an interpretation, but rather
spec-reading.

How are we (in fact, IEEE) going to resolve this?

Alper




 -Original Message-
 From: Bob O'Hara (boohara) [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 06, 2006 4:49 PM
 To: Alper Yegin; Yoshihiro Ohba; Sam Hartman
 Cc: ietf@ietf.org
 Subject: RE: Last Call: draft-ietf-pana-framework-06
 
 Alper,
 
 In my reading of 802.11i, such an AP will not be compliant.  In
 addition, PANA needs to have the 802.11 mobile client also support PANA.
 Currently, PANA packets would also be dropped at the sending client,
 prior to opening the 802.1X controlled port.
 
 In Yoshi's email, referenced at the URL below, he says that it is
 possible to interpret the text in the current 802.11ma revision draft to
 allow the PANA operations described for bootstrapping an 802.11i AP.
 The IEEE is the only body that has the authority to interpret their
 standards.  For 802.11, IEEE delegates that authority to the working
 group that I chair.  I can't forecast what an official interpretation
 response might say, but the text in clause 5 is taken from the overview
 section of the standard.  The text prohibiting non-802.1X frames from
 passing on the uncontrolled port is taken from clause 6, the description
 of the Data SAP.  My opinion would be that the text in clause 6 would be
 given precedence, both because of its placement and because of its
 specificity.
 
 
  -Bob O'Hara, Chair, 802.11 Task Group m
 
 -Original Message-
 From: Alper Yegin [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, March 22, 2006 11:55 AM
 To: Bob O'Hara (boohara); 'Yoshihiro Ohba'; 'Sam Hartman'
 Cc: ietf@ietf.org
 Subject: RE: Last Call: draft-ietf-pana-framework-06
 
 
 Hi Bob,
 
 Last two e-mails were in response to Sam's implementability concern.
 
 Note that, when an IEEE 802.11 AP is used as a PANA EP and bootstrapped
 for
 IEEE 802.11i security, it is not an off-the-shelf AP. Some amount of
 coding needs to be done on the AP.  The question is, would this modified
 AP
 still be compliant with IEEE 802.11i or not (no, PANA WG does not mean
 to
 propose a change to IEEE standards.)
 
 Please see Yoshi's e-mail and let us know what you think.
 http://www1.ietf.org/mail-archive/web/ietf/current/msg41011.html
 
 Thanks.
 
 Alper
 
 
 
 
  -Original Message-
  From: Bob O'Hara (boohara) [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, March 22, 2006 8:34 PM
  To: Alper Yegin; Yoshihiro Ohba; Sam Hartman
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
 
  I have no doubt that an implementation can be made to work, when one
 has
  control of all the layers.  The question is whether PANA bootstrap
 will
  work when all that is supplied is a PANA layer that must operate above
  an existing, presumably standards compliant, 802.1X/802.11i
  implementation.  When one can bypass a restriction of 802.11i (which
  says to drop non-802.1X frames on the uncontrolled port), then PANA
  bootstrap is possible.
 
  However, what authority has PANA to change a standard developed in an
  entirely different standards organization?
 
 
   -Bob
 
  -Original Message-
  From: Alper Yegin [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, March 22, 2006 7:19 AM
  To: 'Yoshihiro Ohba'; 'Sam Hartman'
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
 
  We (Samsung) have an implementation as well.
 
  Alper
 
   -Original Message-
   From: Yoshihiro Ohba [mailto:[EMAIL PROTECTED]
   Sent: Wednesday, March 22, 2006 12:02 AM
   To: Sam Hartman
   Cc: ietf@ietf.org
   Subject: Re: Last Call: draft-ietf-pana-framework-06
  
   If implementability of the specification is an issue, my company has
   an implementation of bootstrapping 802.11i PSK mode based on running
   PANA over Uncontrolled Port.  The implementation works without
   modifying a WiFi hardware or its firmware.  We have a plan to
 publish
   the source code of the implementation in Open Diameter project.
  
   Regards,
   Yoshihiro Ohba
  
   On Tue, Mar 21, 2006 at 11:45:25AM -0500, Sam Hartman wrote:
 Yoshihiro == Yoshihiro Ohba [EMAIL PROTECTED]
 writes:
   
e email discussion over
Yoshihiro the EAP mailing list quoted below, I had a short
Yoshihiro conversation on this issue with Jesse Walker during
Yoshihiro IEEE 802 interim meeting in January in order to
Yoshihiro follow-up the email discussion and understand the
  input
Yoshihiro from Jesse more.  As far as I understand, he seemed
  to
Yoshihiro agree on 

RE: Last Call: draft-ietf-pana-framework-06

2006-04-06 Thread Bob O'Hara \(boohara\)
The official way to do this is to submit an interpretation request to
the IEEE.  The instructions can be found here:
http://standards.ieee.org/reading/ieee/interp/.  The request will then
be referred to the appropriate working group for response and approval.
The earliest that this could be completed by 802.11 is during their
meeting during the week of May 14-18.

This would result in an official response from the 802.11 working group
and the IEEE.  Generally, the response will include referral to the next
maintenance task group for inclusion in a corrigendum or the next
revision of the standard.

 -Bob
 
-Original Message-
From: Alper Yegin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, April 06, 2006 4:22 PM
To: Bob O'Hara (boohara); 'Yoshihiro Ohba'; 'Sam Hartman'
Cc: ietf@ietf.org
Subject: RE: Last Call: draft-ietf-pana-framework-06


Hi Bob,

I think the issue at hand is not the interpretation of text, but the
conflicting text in the 802.11i standard. David Nelson has already shed
some
light to this.

Text in Clause 5 opens the door for non-802.1X protocols to utilize the
uncontrolled port, and we didn't find any limitations on what those
protocols may be -- hence concluded that PANA could be one of those.
This is
where PANA WG came from. I'd not say this is an interpretation, but
rather
spec-reading.

How are we (in fact, IEEE) going to resolve this?

Alper




 -Original Message-
 From: Bob O'Hara (boohara) [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 06, 2006 4:49 PM
 To: Alper Yegin; Yoshihiro Ohba; Sam Hartman
 Cc: ietf@ietf.org
 Subject: RE: Last Call: draft-ietf-pana-framework-06
 
 Alper,
 
 In my reading of 802.11i, such an AP will not be compliant.  In
 addition, PANA needs to have the 802.11 mobile client also support
PANA.
 Currently, PANA packets would also be dropped at the sending client,
 prior to opening the 802.1X controlled port.
 
 In Yoshi's email, referenced at the URL below, he says that it is
 possible to interpret the text in the current 802.11ma revision draft
to
 allow the PANA operations described for bootstrapping an 802.11i AP.
 The IEEE is the only body that has the authority to interpret their
 standards.  For 802.11, IEEE delegates that authority to the working
 group that I chair.  I can't forecast what an official interpretation
 response might say, but the text in clause 5 is taken from the
overview
 section of the standard.  The text prohibiting non-802.1X frames from
 passing on the uncontrolled port is taken from clause 6, the
description
 of the Data SAP.  My opinion would be that the text in clause 6 would
be
 given precedence, both because of its placement and because of its
 specificity.
 
 
  -Bob O'Hara, Chair, 802.11 Task Group m
 
 -Original Message-
 From: Alper Yegin [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, March 22, 2006 11:55 AM
 To: Bob O'Hara (boohara); 'Yoshihiro Ohba'; 'Sam Hartman'
 Cc: ietf@ietf.org
 Subject: RE: Last Call: draft-ietf-pana-framework-06
 
 
 Hi Bob,
 
 Last two e-mails were in response to Sam's implementability concern.
 
 Note that, when an IEEE 802.11 AP is used as a PANA EP and
bootstrapped
 for
 IEEE 802.11i security, it is not an off-the-shelf AP. Some amount of
 coding needs to be done on the AP.  The question is, would this
modified
 AP
 still be compliant with IEEE 802.11i or not (no, PANA WG does not mean
 to
 propose a change to IEEE standards.)
 
 Please see Yoshi's e-mail and let us know what you think.
 http://www1.ietf.org/mail-archive/web/ietf/current/msg41011.html
 
 Thanks.
 
 Alper
 
 
 
 
  -Original Message-
  From: Bob O'Hara (boohara) [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, March 22, 2006 8:34 PM
  To: Alper Yegin; Yoshihiro Ohba; Sam Hartman
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
 
  I have no doubt that an implementation can be made to work, when one
 has
  control of all the layers.  The question is whether PANA bootstrap
 will
  work when all that is supplied is a PANA layer that must operate
above
  an existing, presumably standards compliant, 802.1X/802.11i
  implementation.  When one can bypass a restriction of 802.11i (which
  says to drop non-802.1X frames on the uncontrolled port), then PANA
  bootstrap is possible.
 
  However, what authority has PANA to change a standard developed in
an
  entirely different standards organization?
 
 
   -Bob
 
  -Original Message-
  From: Alper Yegin [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, March 22, 2006 7:19 AM
  To: 'Yoshihiro Ohba'; 'Sam Hartman'
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
 
  We (Samsung) have an implementation as well.
 
  Alper
 
   -Original Message-
   From: Yoshihiro Ohba [mailto:[EMAIL PROTECTED]
   Sent: Wednesday, March 22, 2006 12:02 AM
   To: Sam Hartman
   Cc: ietf@ietf.org
   Subject: Re: Last Call: draft-ietf-pana-framework-06
  
   If implementability of the specification is an issue, my company
has
  

Re: Last Call: draft-ietf-pana-framework-06

2006-04-06 Thread Yoshihiro Ohba
Thanks for the URL to the interpretation request.

The text in the URL says:


Interpretations are issued to explain and clarify the intent of the
standard and are not intended to constitute an alteration to the
original standard or to supply consulting information. The
interpretations subgroup cannot make new rules to fit situations not
yet covered in the standard, even if the investigations of the
subgroup lead it to conclude that the requirement is incomplete or in
error. Changes to the standard are made only through revisions or
supplements to the standard.


The intent of the standard has been already clarified by David Nelson.
TGi voted to accept the text proposed for the intent.  So I don't
expect the intent to be changed through the interpretation request
procedure, while I expect the intent to be more clarified in the
procedure.

Best regards,
Yoshihiro Ohba




On Thu, Apr 06, 2006 at 04:28:07PM -0700, Bob O'Hara (boohara) wrote:
 The official way to do this is to submit an interpretation request to
 the IEEE.  The instructions can be found here:
 http://standards.ieee.org/reading/ieee/interp/.  The request will then
 be referred to the appropriate working group for response and approval.
 The earliest that this could be completed by 802.11 is during their
 meeting during the week of May 14-18.
 
 This would result in an official response from the 802.11 working group
 and the IEEE.  Generally, the response will include referral to the next
 maintenance task group for inclusion in a corrigendum or the next
 revision of the standard.
 
  -Bob
  
 -Original Message-
 From: Alper Yegin [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, April 06, 2006 4:22 PM
 To: Bob O'Hara (boohara); 'Yoshihiro Ohba'; 'Sam Hartman'
 Cc: ietf@ietf.org
 Subject: RE: Last Call: draft-ietf-pana-framework-06
 
 
 Hi Bob,
 
 I think the issue at hand is not the interpretation of text, but the
 conflicting text in the 802.11i standard. David Nelson has already shed
 some
 light to this.
 
 Text in Clause 5 opens the door for non-802.1X protocols to utilize the
 uncontrolled port, and we didn't find any limitations on what those
 protocols may be -- hence concluded that PANA could be one of those.
 This is
 where PANA WG came from. I'd not say this is an interpretation, but
 rather
 spec-reading.
 
 How are we (in fact, IEEE) going to resolve this?
 
 Alper
 
 
 
 
  -Original Message-
  From: Bob O'Hara (boohara) [mailto:[EMAIL PROTECTED]
  Sent: Thursday, April 06, 2006 4:49 PM
  To: Alper Yegin; Yoshihiro Ohba; Sam Hartman
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
  
  Alper,
  
  In my reading of 802.11i, such an AP will not be compliant.  In
  addition, PANA needs to have the 802.11 mobile client also support
 PANA.
  Currently, PANA packets would also be dropped at the sending client,
  prior to opening the 802.1X controlled port.
  
  In Yoshi's email, referenced at the URL below, he says that it is
  possible to interpret the text in the current 802.11ma revision draft
 to
  allow the PANA operations described for bootstrapping an 802.11i AP.
  The IEEE is the only body that has the authority to interpret their
  standards.  For 802.11, IEEE delegates that authority to the working
  group that I chair.  I can't forecast what an official interpretation
  response might say, but the text in clause 5 is taken from the
 overview
  section of the standard.  The text prohibiting non-802.1X frames from
  passing on the uncontrolled port is taken from clause 6, the
 description
  of the Data SAP.  My opinion would be that the text in clause 6 would
 be
  given precedence, both because of its placement and because of its
  specificity.
  
  
   -Bob O'Hara, Chair, 802.11 Task Group m
  
  -Original Message-
  From: Alper Yegin [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, March 22, 2006 11:55 AM
  To: Bob O'Hara (boohara); 'Yoshihiro Ohba'; 'Sam Hartman'
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
  
  
  Hi Bob,
  
  Last two e-mails were in response to Sam's implementability concern.
  
  Note that, when an IEEE 802.11 AP is used as a PANA EP and
 bootstrapped
  for
  IEEE 802.11i security, it is not an off-the-shelf AP. Some amount of
  coding needs to be done on the AP.  The question is, would this
 modified
  AP
  still be compliant with IEEE 802.11i or not (no, PANA WG does not mean
  to
  propose a change to IEEE standards.)
  
  Please see Yoshi's e-mail and let us know what you think.
  http://www1.ietf.org/mail-archive/web/ietf/current/msg41011.html
  
  Thanks.
  
  Alper
  
  
  
  
   -Original Message-
   From: Bob O'Hara (boohara) [mailto:[EMAIL PROTECTED]
   Sent: Wednesday, March 22, 2006 8:34 PM
   To: Alper Yegin; Yoshihiro Ohba; Sam Hartman
   Cc: ietf@ietf.org
   Subject: RE: Last Call: draft-ietf-pana-framework-06
  
   I have no doubt that an implementation can be made to work, when one
  has
   control of all the 

Re: Guidance needed on well known ports

2006-04-06 Thread Jeffrey Hutzelman



On Friday, March 24, 2006 08:23:20 AM -0500 Steven M. Bellovin 
[EMAIL PROTECTED] wrote:



On Thu, 23 Mar 2006 20:56:51 -0800, Joe Touch [EMAIL PROTECTED] wrote:







Since it seems like this might be useful, I'll pull a draft together on
how to do this without 1078's extra connection, more like the
late-binding we do in datarouter, very shortly...



1078 doesn't use an extra connection; it hands off the open connection
to the protocol handler.

Your suggestion of using a TCP option instead is friendlier to
firewalls, though.


And it uses fewer round trips.  I like this idea.



does require a mod to TCP to allow the dest port to be unbound (e.g.,
'0') if the option is present, and enable the return SYN-ACK to update
the TCB on arrival.


This part, though, seems like it could be perilous.  Why not start with
a non-zero port and hand off the connection, a la tcpmux?

-- Jeff

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Guidance needed on well known ports

2006-04-06 Thread Jeffrey Hutzelman



On Thursday, March 23, 2006 09:40:06 PM -0800 Stuart Cheshire 
[EMAIL PROTECTED] wrote:



Right now there are a couple of hundred application-layer protocols
implemented that work this way.


And wow is there a lot of MDNS broadcast traffic on my network.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-ietf-pana-framework-06

2006-04-06 Thread Bob O'Hara \(boohara\)
Yoshihiro,

You say that the intent of the standard has been already clarified by
David Nelson.  This is incorrect.  David has offered his opinion as an
individual as to what he believes took place.  He has no authority to
interpret the intent of the standard.

Only the working group can interpret the standard when there is an
apparent ambiguity, as this situation appears.  Basing the work of PANA
on anything less would be very precarious, indeed.

 -Bob
 
-Original Message-
From: Yoshihiro Ohba [mailto:[EMAIL PROTECTED] 
Sent: Thursday, April 06, 2006 4:46 PM
To: Bob O'Hara (boohara)
Cc: Alper Yegin; Yoshihiro Ohba; Sam Hartman; ietf@ietf.org
Subject: Re: Last Call: draft-ietf-pana-framework-06

Thanks for the URL to the interpretation request.

The text in the URL says:


Interpretations are issued to explain and clarify the intent of the
standard and are not intended to constitute an alteration to the
original standard or to supply consulting information. The
interpretations subgroup cannot make new rules to fit situations not
yet covered in the standard, even if the investigations of the
subgroup lead it to conclude that the requirement is incomplete or in
error. Changes to the standard are made only through revisions or
supplements to the standard.


The intent of the standard has been already clarified by David Nelson.
TGi voted to accept the text proposed for the intent.  So I don't
expect the intent to be changed through the interpretation request
procedure, while I expect the intent to be more clarified in the
procedure.

Best regards,
Yoshihiro Ohba




On Thu, Apr 06, 2006 at 04:28:07PM -0700, Bob O'Hara (boohara) wrote:
 The official way to do this is to submit an interpretation request
to
 the IEEE.  The instructions can be found here:
 http://standards.ieee.org/reading/ieee/interp/.  The request will then
 be referred to the appropriate working group for response and
approval.
 The earliest that this could be completed by 802.11 is during their
 meeting during the week of May 14-18.
 
 This would result in an official response from the 802.11 working
group
 and the IEEE.  Generally, the response will include referral to the
next
 maintenance task group for inclusion in a corrigendum or the next
 revision of the standard.
 
  -Bob
  
 -Original Message-
 From: Alper Yegin [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, April 06, 2006 4:22 PM
 To: Bob O'Hara (boohara); 'Yoshihiro Ohba'; 'Sam Hartman'
 Cc: ietf@ietf.org
 Subject: RE: Last Call: draft-ietf-pana-framework-06
 
 
 Hi Bob,
 
 I think the issue at hand is not the interpretation of text, but the
 conflicting text in the 802.11i standard. David Nelson has already
shed
 some
 light to this.
 
 Text in Clause 5 opens the door for non-802.1X protocols to utilize
the
 uncontrolled port, and we didn't find any limitations on what those
 protocols may be -- hence concluded that PANA could be one of those.
 This is
 where PANA WG came from. I'd not say this is an interpretation, but
 rather
 spec-reading.
 
 How are we (in fact, IEEE) going to resolve this?
 
 Alper
 
 
 
 
  -Original Message-
  From: Bob O'Hara (boohara) [mailto:[EMAIL PROTECTED]
  Sent: Thursday, April 06, 2006 4:49 PM
  To: Alper Yegin; Yoshihiro Ohba; Sam Hartman
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
  
  Alper,
  
  In my reading of 802.11i, such an AP will not be compliant.  In
  addition, PANA needs to have the 802.11 mobile client also support
 PANA.
  Currently, PANA packets would also be dropped at the sending client,
  prior to opening the 802.1X controlled port.
  
  In Yoshi's email, referenced at the URL below, he says that it is
  possible to interpret the text in the current 802.11ma revision
draft
 to
  allow the PANA operations described for bootstrapping an 802.11i AP.
  The IEEE is the only body that has the authority to interpret their
  standards.  For 802.11, IEEE delegates that authority to the working
  group that I chair.  I can't forecast what an official
interpretation
  response might say, but the text in clause 5 is taken from the
 overview
  section of the standard.  The text prohibiting non-802.1X frames
from
  passing on the uncontrolled port is taken from clause 6, the
 description
  of the Data SAP.  My opinion would be that the text in clause 6
would
 be
  given precedence, both because of its placement and because of its
  specificity.
  
  
   -Bob O'Hara, Chair, 802.11 Task Group m
  
  -Original Message-
  From: Alper Yegin [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, March 22, 2006 11:55 AM
  To: Bob O'Hara (boohara); 'Yoshihiro Ohba'; 'Sam Hartman'
  Cc: ietf@ietf.org
  Subject: RE: Last Call: draft-ietf-pana-framework-06
  
  
  Hi Bob,
  
  Last two e-mails were in response to Sam's implementability
concern.
  
  Note that, when an IEEE 802.11 AP is used as a PANA EP and
 bootstrapped
  for
  IEEE 802.11i security, it is not an off-the-shelf AP. Some amount
of
  

Seeking... IAB Executive Director

2006-04-06 Thread Leslie Daigle

All,

The IAB is currently looking to appoint an Executive Director.
The Executive Director is a non-voting ex-officio member of the IAB.
(See RFC2850, the IAB's charter, for details).  We are looking for
suggestions, based on the brief  profile for the role, below.

We would like you to consider this profile and either suggest yourself
or other people that you think that would fit well in  this role by
sending mail to the IAB at [EMAIL PROTECTED]  We do not  intend to disclose
the names of the nominees in public, but we may wish to discuss this
issue with third parties such as the Area Directors.  If you have a
problem with your name being mentioned in this context, please let us
know.

Note that this profile is written for a somewhat ideal candidate.  We
fully realize that such people are probably non-existent.  So  don't
hesitate to suggest somebody who in  your opinion would fit this  role
but might not meet all the qualifications 100 percent. Here  is the
profile:

 - Writing skills.  The Executive Director keeps and edits the minutes
   of the IAB meetings and prepares them for public dissemination.

 - Sysadmin skills.  The Executive Director handles the administration
   of the IAB websites, including the maintenance of tools such as
   Wikis,  Jabber servers, email lists, etc.

 - IETF experience.  It is desirable for the candidate to have at least
   some experience with the IETF.

 - Organizational skills.  The Executive Director serves as a
   program manager for IAB work items.  It is desirable for the
   candidate to be able to juggle many outstanding tasks simultaneously.

-  Enough time available.  For example, it is preferable that the
   candidate not be chair of more than one IETF WG, or a member
   of the IESG or IAB.

We would like to receive your comments  suggestions by April 14th
2006 and we plan to make a decision as soon as possible thereafter.
It will be helpful if you indicate in your email how you or the
suggested person fits this profile as best as possible.

Leslie Daigle, for The IAB.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Guidance needed on well known ports

2006-04-06 Thread Joe Touch


Jeffrey Hutzelman wrote:
 
 
 On Friday, March 24, 2006 08:23:20 AM -0500 Steven M. Bellovin
 [EMAIL PROTECTED] wrote:
 
 On Thu, 23 Mar 2006 20:56:51 -0800, Joe Touch [EMAIL PROTECTED] wrote:




 Since it seems like this might be useful, I'll pull a draft together on
 how to do this without 1078's extra connection, more like the
 late-binding we do in datarouter, very shortly...


 1078 doesn't use an extra connection; it hands off the open connection
 to the protocol handler.

 Your suggestion of using a TCP option instead is friendlier to
 firewalls, though.
 
 And it uses fewer round trips.  I like this idea.
 
 
 does require a mod to TCP to allow the dest port to be unbound (e.g.,
 '0') if the option is present, and enable the return SYN-ACK to update
 the TCB on arrival.
 
 This part, though, seems like it could be perilous.  Why not start with
 a non-zero port and hand off the connection, a la tcpmux?

TCPMUX doesn't 'handoff'. It expects that either the connection is
closed and another is opened, or that the service desired is served off
of its port once opened after the initial exchange (in-band).

The latter is a possibility here. The downside is that it then forces a
two-step demultiplexing of incoming packets; there may be utility in a
variant that allows the dest port to be unbound and later filled-in, or
changed during the connection, so that services can be more efficiently
demultiplexed.

Joe

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Guidance needed on well known ports

2006-04-06 Thread Noel Chiappa
 From: Joe Touch [EMAIL PROTECTED]

 TCPMUX doesn't 'handoff'. It expects that .. the service desired is
 served off of its port once opened after the initial exchange
 (in-band).
 .. The downside is that it then forces a two-step demultiplexing of
 incoming packets; there may be utility in a variant that allows the
 dest port to be unbound and later filled-in, or changed during the
 connection, so that services can be more efficiently demultiplexed.

I'm missing something here. A TCP connection is identified by the (srcaddr,
sport, dstaddr, dport) tuple. TCB's are looked up by this tuple. Connections
to TCPMUX will all have the same dstaddr/dport, but will presumably have
different srcaddr's, and (presumably) random sport's, and can be
distinguished that way.

Why can't the TCPMUX listener just bind the correct application to the TCB
(after figuring out what the appropriate application is), and then forget
about the connection, leaving it entirely to the application to deal with?
All packets which belong to that connection will automatically go to that
TCB, and thence to the application, with no second layer of demux needed.
Am I missing something?

Noel

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Guidance needed on well known ports

2006-04-06 Thread Lyndon Nerenberg


On Apr 6, 2006, at 6:37 PM, Noel Chiappa wrote:

Why can't the TCPMUX listener just bind the correct application to  
the TCB
(after figuring out what the appropriate application is), and then  
forget
about the connection, leaving it entirely to the application to  
deal with?
All packets which belong to that connection will automatically go  
to that
TCB, and thence to the application, with no second layer of demux  
needed.

Am I missing something?


On BSD and Solaris you can just pass the file descriptor from the new  
connection to the already running server.


--lyndon

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Guidance needed on well known ports

2006-04-06 Thread Steven M. Bellovin
On Thu,  6 Apr 2006 21:37:49 -0400 (EDT), [EMAIL PROTECTED] (Noel
Chiappa) wrote:

  From: Joe Touch [EMAIL PROTECTED]
 
  TCPMUX doesn't 'handoff'. It expects that .. the service desired is
  served off of its port once opened after the initial exchange
  (in-band).
  .. The downside is that it then forces a two-step demultiplexing of
  incoming packets; there may be utility in a variant that allows the
  dest port to be unbound and later filled-in, or changed during the
  connection, so that services can be more efficiently demultiplexed.
 
 I'm missing something here. A TCP connection is identified by the (srcaddr,
 sport, dstaddr, dport) tuple. TCB's are looked up by this tuple. Connections
 to TCPMUX will all have the same dstaddr/dport, but will presumably have
 different srcaddr's, and (presumably) random sport's, and can be
 distinguished that way.
 
 Why can't the TCPMUX listener just bind the correct application to the TCB
 (after figuring out what the appropriate application is), and then forget
 about the connection, leaving it entirely to the application to deal with?
 All packets which belong to that connection will automatically go to that
 TCB, and thence to the application, with no second layer of demux needed.
 Am I missing something?
 
No -- that's precisely how it works.


--Steven M. Bellovin, http://www.cs.columbia.edu/~smb

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Last Call: 'IPsec Security Policy Database Configuration MIB' to Proposed Standard

2006-04-06 Thread The IESG
The IESG has received a request from the IP Security Policy WG to consider the 
following document:

- 'IPsec Security Policy Database Configuration MIB '
   draft-ietf-ipsp-spd-mib-05.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-04-20.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-ipsp-spd-mib-05.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce