Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-03 Thread Stephane Bortzmeyer
On Tue, Oct 02, 2007 at 12:40:31PM -0400,
 Sam Hartman [EMAIL PROTECTED] wrote 
 a message of 17 lines which said:

 I'd appreciate it if you took Paul's comments a lot more seriously
 and looked at whether the dnsop view on this issue extends to other
 parts of the ietf.  To the extent that it does not, please engage in
 a discussion designed to build consensus rather than assertions that
 someone who disagrees with you is naive.

OK, since I agree with Joao Damas on this point, let me rephrase it
(again) without harsh words.

Everyone took Paul Hoffman's and John Klensin's comments
seriously. But these comments have a big flaw, they jump from the
(legitimate) use case to a specific (and bad) solution. John Klensin's
message wasted many bytes describing the (well known) problem instead
of trying to see if the current I-D properly describes the solutions.

Everyone agrees that there is a very real and very legitimate use case
for roaming users to *not* use the default DNS resolver of the current
access point (see RFC 4925, section 2.5.2 for a typical reason).

But suggesting ORNS (Open Recursive Name Servers) for the solution to
this issue is, indeed, a bad idea (do note I did not say the N word),
for the reasons explained in
draft-ietf-dnsop-reflectors-are-evil-04.txt (reflections attack).

There are other solutions to this issue and lists have already been
given in this thread *and* in the I-D we discuss. These solutions are
TSIG, local caching resolvers and VPN. May be there is an editorial
problem if they are not well explained but the I-D does completely
cover the issue of romaing users.




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Would someone help the secretariat figure out why they cannot route to teredo addresses?

2007-10-03 Thread Arifumi Matsumoto

Rémi Denis-Courmont wrote:

Le Monday 01 October 2007 20:50:00 ext Sam Hartman, vous avez écrit :

Hi.  I opened a ticket with the secretariat a few weeks ago
complaining that I cannot reach www.ietf.org using a teredo address
either allocated through the Microsoft Teredo server or the Debian
teredo server.

This is annoying because glibc's source address selection algorithm
seems to prefer teredo addresses to v4 addresses.  So, I get really
bad response times to www.ietf.org when using teredo.


To make a long short, that depends on your glibc version. As far as I 
remember, RFC3484 was implemented in version 2.4. Configurable policy in 
version 2.5, and Teredo in the default policy only very recently.


Because Teredo is not mentioned in RFC3484, I expect many other RFC3484 
implementations do have the same issue. Unfortunately, even if they don't 
have Teredo support themselves, they should still recognize the prefix for 
source address selection...
I did write an I-D to allocate one new prefix, but then I realized that the 
revised RFC3484 draft work already mentioned it, so I did not bother 
submitting it.


Do you mean this I-D ?
http://tools.ietf.org/id/draft-arifumi-ipv6-rfc3484-revise-00.txt

This one includes mainly minor changes to RFC 3484.
I tried to talk about this I-D at Prague, but I couldn't have time
there. Though this I-D is expired now, I want to put this on the
table again.

Do you have any comments about this I-D ?
Now that we have 6man wg, is it a good idea to move from intarea to 6man ?

Thanks.

--
Arifumi Matsumoto
   IP Technology Expert Team
   Secure Communication Project
   NTT Information Sharing Platform Laboratories
   E-mail: [EMAIL PROTECTED]




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [secdir] secdir review ofdraft-ietf-dnsop-reflectors-are-evil-04.txt

2007-10-03 Thread michael.dillon
  From: Danny McPherson [EMAIL PROTECTED]
 
  where's the authoritative source for who owns what prefixes
 
 This, one could imagining putting together.

The IETF has delegated this to the IANA and the RIRs. So far, the RIRs
have not done anything more than keep the antiquated whois directory
functioning. I use the word antiquated in reference to whois directory
services not because of the query protocol, but because of its origins
as a way of auditing network users in order to justify budget
allocations back in ARPANET days. Since that time, there has never been
a serious attempt to rethink the purpose and scope of the IP addressing
whois directory. 

One wonders whether the vastness of the IPv6 address space is sufficient
change for the IETF to write some guidance to the RIRs regarding the
purpose and scope of a whois directory. Or maybe some other method of
signalling the ownership of address prefixes.

  and who's permitted to originate/transit what prefixes?

The RIRs have taken a stab at this problem with route registry services
but it has never gotten significant support from ISPs. Since the RIRs
delegate short prefixes to ISPs, who then may delegate longer prefixes
in some way, the chain of permission to originate/transit, originates
with the RIRs. Is a new protocol needed for this to work right? Or is
there simply not enough demand.

Note that some RIRs such as RIPE, attempt to maintain a fairly detailed
route registry database as part of their whois directory.

 Second, you're talking about potentially orders of magnitude 
 more data: for each destination, there are worldwide likely 
 hundreds (or more) of ISP's which are likely to be viable 
 backbone transits. (By 'backbone transit', I mean ISP's/AS's 
 which are not even directly connected to the organization 
 which is the source or destination of the packets; e.g. 
 customer A is connected to ISP p which is connected to ISP q 
 which is connected to ISP r which is connected to customer B; 
 q is a 'backbone transit'.)

We have the technology to deal with orders of magnitude more data,
assuming that the task is delegated to servers, not to routers.

--Michael Dillon

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IPv4 to IPv6 transition

2007-10-03 Thread Ray Plzak

Brian,

My comment was regarding a head in the sand approach when it comes to the 
recurring themes that the developing world can't IP address space, whether it 
is v4 or v6. The fact is that they can get it from the RIR like those in the 
developed regions can get it from their RIRs. The real problem, in other words, 
putting head in sand, is to substitute this address space access issue for the 
real one of what can the recipients of the address space do with it when they 
get, particularly if they have no hardware to run it on, no electricity to 
power it, and no upstream willing to route it. It is those issues that need to 
be hit head on if the Internet is to really grow in the developing regions of 
the globe.

Ray

 -Original Message-
 From: Brian E Carpenter [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 02, 2007 4:39 PM
 To: Ray Plzak
 Cc: Tim Chown; ietf@ietf.org
 Subject: Re: IPv4 to IPv6 transition

 Ray,

 I don't think it's quite fair to refer to ostriches
 when ARIN is already on record:
 http://www.arin.net/v6/v6-resolution.html

 Also, for those who like to see things in real time,
 there's always http://penrose.uk6x.com/

 Regards
 Brian Carpenter
 University of Auckland




 On 2007-10-03 02:47, Ray Plzak wrote:
  Head in the sand is substituting the statement shortage of IP
 addresses for the condition of the inability to use the addresses
 (take your pick when it comes to infrastructure deficiencies).
 
  Ray
 
  -Original Message-
  From: Tim Chown [mailto:[EMAIL PROTECTED]
  Sent: Tuesday, October 02, 2007 9:32 AM
  To: ietf@ietf.org
  Subject: Re: IPv4 to IPv6 transition
 
  On Tue, Oct 02, 2007 at 09:05:39AM -0400, Keith Moore wrote:
  Ray Plzak wrote:
  The shortage of IPv4 addresses in developing countries in a red
  herring.
  that has to rank as one of the most bizarre statements that's ever
  been
  made on the ietf list.
  More of an ostrich than a herring?
 
 
 .==._
   /  .,   .`.
  /__(,_.-' ||
 `/|||
 / |||
  \|||
   ~ ~ |\ ~~!)~~~
 
 
  Tim
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IPv4 to IPv6 transition

2007-10-03 Thread Ruri Hiromi

correction,

http://www.apple.com/jp/downloads/dashboard/networking_security/ 
ipv420.html


let me know what do you think about it :-)
Regards,

On 2007/10/03, at 11:24, Ruri Hiromi wrote:



dedicate to ostriches...
http://www.apple.com/en/downloads/dashboard/networking_security/ 
ipv420.html


On 2007/10/02, at 22:32, Tim Chown wrote:


On Tue, Oct 02, 2007 at 09:05:39AM -0400, Keith Moore wrote:

Ray Plzak wrote:
The shortage of IPv4 addresses in developing countries in a red  
herring.
that has to rank as one of the most bizarre statements that's  
ever been

made on the ietf list.


More of an ostrich than a herring?


   .==._
 /  .,   .`.
/__(,_.-' ||
   `/|||
   / |||
\|||
 ~ ~ |\ ~~!)~~~


Tim

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


---
Ruri Hiromi
[EMAIL PROTECTED]


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


---
Ruri Hiromi
[EMAIL PROTECTED]



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IPv4 to IPv6 transition

2007-10-03 Thread Marc Manthey


On Oct 3, 2007, at 12:55 PM, Ruri Hiromi wrote:
http://www.apple.com/jp/downloads/dashboard/networking_security/ 
ipv420.html


hi Ruri ,

well, i could imagine what its good  for , but an english version  
would be appreciated ;)


cheers

Marc

--
Marc Manthey -
LET -  research + deployment
D- 50672 Cologne
Hildeboldplatz 1a
web: http://www.let.de
my xing profile
https://www.xing.com/profile/Marc_Manthey
phone mobile:
0049.221.355.80.32
0049.177.341.54.81

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IPv4 to IPv6 transition

2007-10-03 Thread Stephane Bortzmeyer
On Wed, Oct 03, 2007 at 07:55:40PM +0900,
 Ruri Hiromi [EMAIL PROTECTED] wrote 
 a message of 64 lines which said:

http://www.apple.com/jp/downloads/dashboard/networking_security/ipv420.html
  ^^
  Many webmasters still have not read RFC 4646 :-(

 let me know what do you think about it :-)

Any translation in my own language? For english, Google suggests:

IPv4 depletion clock 2.0

Empty circumstance of the IPv4 address space which IANA has managed
and remaining days to depletion expectation day, it can look through
the IPv4 address (presumption) and the like at present time.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IPv4 to IPv6 transition

2007-10-03 Thread Tony Hansen
courtesy of google translation:

http://translate.google.com/translate?u=http%3A%2F%2Fwww.apple.com%2Fjp%2Fdownloads%2Fdashboard%2Fnetworking_security%2Fipv420.html+langpair=ja%7Cenhl=ensafe=offie=UTF-8oe=UTF-8prev=%2Flanguage_tools

Tony Hansen
[EMAIL PROTECTED]

Marc Manthey wrote:
 
 On Oct 3, 2007, at 12:55 PM, Ruri Hiromi wrote:
 http://www.apple.com/jp/downloads/dashboard/networking_security/ipv420.html
 
 well, i could imagine what its good  for , but an english version would
 be appreciated ;)


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [secdir] secdir review of draft-ietf-dnsop-reflectors-are-evil-04.txt

2007-10-03 Thread Jeffrey Hutzelman



On Monday, October 01, 2007 10:34:37 AM -0600 Danny McPherson 
[EMAIL PROTECTED] wrote:



Note that in real deployments just this behavior has broken things
on occasion, as many firewall and other such policy application points
assume things like DNS resolution will only be UDP/53 transactions.


Yeah; I'm getting a little tired of having our protocols redefined based on 
the incorrect assumptions of people who don't understand them.  The DNS 
sometimes uses TCP, UDP flows can last more than one round trip, and ICMP 
unreachable messages are an essential part of IP; vendors and operators who 
assume otherwise should be made to fix their assumptions, instead of 
everyone else having to cripple their applications and networks to make the 
assumptions true.


-- Jeff

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [IPFIX] draft-ietf-ipfix-protocol-26.txt

2007-10-03 Thread Boschi, Elisa
Scott,

we received similar comments during the transport directorate review of the 
IPFIX implementation guidelines. The new revision of the document, now 
available at:

http://www.ietf.org/internet-drafts/draft-ietf-ipfix-implementation-guidelines-07.txt

might address your concerns.

I'm copying the UDP section here below for your convenience.

Elisa


---

6.2.  UDP

   UDP is useful in simple systems where an SCTP stack is not available,
   and where there is insufficient memory for TCP buffering.

   However, UDP is not a reliable transport protocol, and IPFIX messages
   sent over UDP might be lost as with partially-reliable SCTP streams.
   UDP is not the recommended protocol for IPFIX and is intended for use
   in cases in which IPFIX is replacing an existing NetFlow
   infrastructure, with the following properties:

   o  A dedicated network,

   o  within a single administrative domain,

   o  where SCTP is not available due to implementation constraints,

   o  and the collector is as topographically close as possible to the
  exporter.

   Note that because UDP itself provides no congestion control
   mechanisms, it is recommended to use UDP transport only on managed
   networks, where the network path has been explicitly provisioned for
   IPFIX traffic through traffic engineering mechanisms, such as rate
   limiting or capacity reservations.

   An important example of an explicitly provisioned managed network for
   IPFIX is use of IPFIX to replace a functioning NetFlow implementation
   on a dedicated network.  In this situation, the dedicated network
   should be provisioned in accordance with the NetFlow deployment
   experience that flow export traffic generated by monitoring an
   interface will amount to 2-5% of the monitored interface's bandwidth.

   As recommended in [I-D.ietf-tsvwg-udp-guidelines] an application
   SHOULD NOT send UDP messages that result in IP packets that exceed
   the MTU of the path to the destination and SHOULD enable UDP
   checksums (see sections 3.2 and 3.4 of
   [I-D.ietf-tsvwg-udp-guidelines] respectively).

   Since IPFIX assumes reliable transport of templates over SCTP, this
   necessitates some changes for IPFIX template management over UDP.
   Templates sent from the Exporting Process to the Collecting Process
   over UDP MUST be resent at regular time intervals; these intervals
   MUST be configurable.

   We recommend a default Template resend time of 10 minutes,
   configurable between 1 minute and 1 day.

   Note that this could become an interoperability problem, e.g. if an
   Exporter re-sends Templates once per day, while a Collector expires
   Templates hourly, then they may both be IPFIX-compatible, but not be
   interoperable.

   Retransmission time intervals that are too short waste bandwidth on
   unnecessary template retransmissions.  On the other hand, time
   intervals that are too long introduce additional costs or risk of
   data loss by potentially requiring the Collector to cache more data
   without having the Templates available to decode it.

   To increase reliability and limit the amount of potentially lost data
   the Exporting Process MAY resend additional templates using a packet-
   based schedule.  In this case Templates are resent depending on the
   number of data packets sent.  Similarly to the time interval,
   resending a Template every few packets introduces additional overhead
   while resending after a large amount of packets have already been
   sent means high costs due to the data caching and potential data
   loss.

   We recommend a default Template resend interval of 20 packets,
   configurable between 1 and 1000 packets.

   Note that a sufficiently small resend time or packet interval may
   cause a system to become stuck, continually re-sending templates.
   e.g., if the resend packet interval is 2 (i.e., templates are to be
   sent in every other packet) but more than two packets are required to
   send all the templates, then the resend interval will have expired by
   the time the templates have been sent, and templates will be sent
   continuously - possibly preventing any data from being sent at all.
   Therefore the Template resend intervals should be considered from the
   last data packet, and should not be tied to specific sequence
   numbers.

   The Collecting Process SHOULD use the Sequence Number in the IPFIX
   Message header to determine whether any messages are lost.

   The following may be done to mitigate message loss:

   o  Move the Collector topologically closer to the Exporter.

   o  Increase the bandwidth of the links through which the Data Records
  are exported.

   o  Use sampling, filtering, or aggregation in the Metering Process to
  reduce the amount of exported data.

   o  Increase the buffer size at the Collector and/or the Exporter.

   Before using a Template for the first time, the Exporter may send it
   in several different IPFIX Messages spaced out 

Re: [DNSOP] Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-03 Thread Paul Wouters
On Fri, 28 Sep 2007, Jaap Akkerhuis wrote:

 There are two major reasons for an organization to not want roaming
 users to trust locally-assigned DNS servers.

 Open recursive servers doesn't help in against man in the middle
 attacks. If you want to avoid that use VPN's or (for DNS) TSIG.

That's why you want your own caching resolver on your laptop. But I
guess hotspots won't work as well with that. Then again, the whole
captive portal by hacking up DNS packets needs to go away when DNSSEC
deployment deems that interfering inappropriate.

Is there some IETF work going on to standarize captive portal bootstraps?

Paul

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


[secdir] security review of draft-edwards-urn-smpte-02

2007-10-03 Thread Tobias Gondrom
Hello, 

I have re-reviewed this document (draft-edwards-urn-smpte-02) as part of the 
security directorate's ongoing effort to review all IETF documents being 
processed by the IESG.  
These comments were written primarily for the benefit of the security area 
directors.  Document editor should treat these comments just like any other 
last call comments.

Note: this is a revisit of the document as the first security review has been 
conducted on version-01 on May 8th, 2007 with no major findings but 5 comments.
I still agree with the author that this document introduces no security issues 
other than those normally associated with the use and resolution of URNs in 
general. 


All comments from the former security review have been resolved. 
No new problems have been introduced.


Which leaves two minor comments on version-02:
1. minor editorial comment: 
Section 8 references: 
Society of Motion Picture and Television Engineers,
Uniform Resource Names for SMPTE Resources, SMPTE 2029,
http://www.smpte.org (to be published).

Should be changed to 
Society of Motion Picture and Television Engineers,
Uniform Resource Names for SMPTE Resources, SMPTE 2029-2007
http://www.smpte.org

As the SMPTE-2029-2007 document has been actually published (as had been 
required for the draft to proceed). 
Now just the reference text needs to be updated. 


2. and the personal comment/note from the version-01 remains as I did not 
receive feedback on this one: 
a) I am not sure that SMPTE really needs a formal URN, and why an informal URN 
would not be sufficient. But this should be decided by the community. 
Note: draft version-02 introduced some justification about the need for this 
new namespace in section 5 of the draft. But from my personal view this mainly 
equals to we need our(SMPTE) own URN which is exclusively under our(SMPTE) 
control. As a reason this may not be considered a real reason/value by itself 
and thus may not be sufficient. 

b) As the organization seems mainly focussed on the North American Continent, 
it might also be a good idea to pursue via independent expert reviews the 
question whether there exist potential namespace conflicts with other 
international organizations in this area (Motion Picture and Television) like 
e.g. ARIB (Association of Radio Industries and Businesses) or others. 



Best regards, Tobias Gondrom




__
Tobias Gondrom
Head of Open Text Security Team
Director, Product Security

Open Text
Technopark 2
Werner-von-Siemens-Ring 20
D-85630 Grasbrunn

Phone: +49 (0) 89 4629-1816
Mobile: +49 (0) 173 5942987
Telefax: +49 (0) 89 4629-33-1816
eMail: mailto:[EMAIL PROTECTED] 
Internet: http://www.opentext.com/  

Place of Incorporation / Sitz der Gesellschaft: Open Text GmbH, 
Werner-von-Siemens-Ring 20, 85630 Grasbrunn, Germany | Phone: +49 (0) 89 4629 0 
| Fax: +49 (0) 89 4629 1199 | Register Court / Registergericht: München, 
Germany | Trade Register Number / HRB: 168364 | VAT ID Number /USt-ID: DE 114 
169 819 | Managing Director / Geschäftsführer: John Shackleton, Walter Köhler

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [DNSOP] Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-03 Thread Paul Wouters
On Fri, 28 Sep 2007, Dean Anderson wrote:

 Maybe its not mentioned because its not a practical solution. But
 whatever the reason it isn't mentioned, a 25 million user VPN is not
 going to happen with 10/8. A comcast person recently complained on PPML
 that there wasn't enough RFC1918 space for their internal network.

Time for them to migrate to IPv6? :)

Paul

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [DNSOP] Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-03 Thread Paul Wouters
On Fri, 28 Sep 2007, Joe Abley wrote:

 I'm surprised by that comment.

 I think it's a common use case that organisations who deploy VPNs have split
 DNS; that is, namespaces available through internal network resolvers that do
 not appear in the global namespace. In my experience, it is normal for:

 - VPN client software to use IP addresses rather than names to establish a
 secure tunnel with the home network

If you are a worldwide organisation, you want to connect to the nearest
VPN point, and not your home vpn point. This is done by customising
DNS answers (eg bind views or akamai like setups). The last thing I want
is for my Dutch branch, to connect me to the company vpn in The Netherlands,
when I'm in the US, crossing the atlantic twice.

You only start to use the internal company's DNS server, after you have
connected to the VPN - if only to resolve internal network only machines.

Paul

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IPv4 to IPv6 transition

2007-10-03 Thread Ole Jacobsen
It actually IS English, try installing, it localizes.

Ole



Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Cisco Systems
Tel: +1 408-527-8972   Mobile: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj



On Wed, 3 Oct 2007, Marc Manthey wrote:

 
 On Oct 3, 2007, at 12:55 PM, Ruri Hiromi wrote:
 http://www.apple.com/jp/downloads/dashboard/networking_security/ipv420.html
 
 hi Ruri ,
 
 well, i could imagine what its good  for , but an english version would be
 appreciated ;)
 
 cheers
 
 Marc
 
 --
 Marc Manthey -
 LET -  research + deployment
 D- 50672 Cologne
 Hildeboldplatz 1a
 web: http://www.let.de
 my xing profile
 https://www.xing.com/profile/Marc_Manthey
 phone mobile:
 0049.221.355.80.32
 0049.177.341.54.81
 

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IPv4 to IPv6 transition

2007-10-03 Thread John Day
If IANA had any resolve there are at least 25 -30 Class A blocks that 
should be reclaimed and are not or should not be part of the public 
Internet address space.




At 6:56 -0400 2007/10/03, Ray Plzak wrote:

Brian,

My comment was regarding a head in the sand approach when it comes 
to the recurring themes that the developing world can't IP address 
space, whether it is v4 or v6. The fact is that they can get it from 
the RIR like those in the developed regions can get it from their 
RIRs. The real problem, in other words, putting head in sand, is to 
substitute this address space access issue for the real one of what 
can the recipients of the address space do with it when they get, 
particularly if they have no hardware to run it on, no electricity 
to power it, and no upstream willing to route it. It is those issues 
that need to be hit head on if the Internet is to really grow in the 
developing regions of the globe.


Ray


 -Original Message-
 From: Brian E Carpenter [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 02, 2007 4:39 PM
 To: Ray Plzak
 Cc: Tim Chown; ietf@ietf.org
 Subject: Re: IPv4 to IPv6 transition

 Ray,

 I don't think it's quite fair to refer to ostriches
 when ARIN is already on record:
 http://www.arin.net/v6/v6-resolution.html

 Also, for those who like to see things in real time,
 there's always http://penrose.uk6x.com/

 Regards
 Brian Carpenter
 University of Auckland




 On 2007-10-03 02:47, Ray Plzak wrote:
  Head in the sand is substituting the statement shortage of IP
 addresses for the condition of the inability to use the addresses
 (take your pick when it comes to infrastructure deficiencies).
 
  Ray
 
  -Original Message-
  From: Tim Chown [mailto:[EMAIL PROTECTED]
  Sent: Tuesday, October 02, 2007 9:32 AM
  To: ietf@ietf.org
  Subject: Re: IPv4 to IPv6 transition
 
  On Tue, Oct 02, 2007 at 09:05:39AM -0400, Keith Moore wrote:
  Ray Plzak wrote:
  The shortage of IPv4 addresses in developing countries in a red
  herring.
  that has to rank as one of the most bizarre statements that's ever
  been
  made on the ietf list.
  More of an ostrich than a herring?
 
 
 .==._
   /  .,   .`.
  /__(,_.-' ||
 `/|||
 / |||
  \|||
   ~ ~ |\ ~~!)~~~
 
 
  Tim
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [DNSOP] Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-03 Thread Tim Chown
On Fri, Sep 28, 2007 at 05:29:43PM -0400, Paul Wouters wrote:
 On Fri, 28 Sep 2007, Dean Anderson wrote:
 
  Maybe its not mentioned because its not a practical solution. But
  whatever the reason it isn't mentioned, a 25 million user VPN is not
  going to happen with 10/8. A comcast person recently complained on PPML
  that there wasn't enough RFC1918 space for their internal network.
 
 Time for them to migrate to IPv6? :)

http://www.6journal.org/archive/0265/

-- 
Tim



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IPv4 to IPv6 transition

2007-10-03 Thread Jun-ichiro itojun Hagino
 On Oct 3, 2007, at 12:55 PM, Ruri Hiromi wrote:
  http://www.apple.com/jp/downloads/dashboard/networking_security/ 
  ipv420.html
 
 well, i could imagine what its good  for , but an english version  
 would be appreciated ;)

the widget itself is bilingual (english/japanese).

itojun

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Spammers answering TMDA Queries

2007-10-03 Thread Harald Tveit Alvestrand



--On 2. oktober 2007 18:49 -0400 Russ Housley [EMAIL PROTECTED] wrote:


The Secretariat tells me that Spammers are responding to TDMA queries so
that their mail goes through.  They have made the suggestion that we
clear the list of people once per year.  This would mean that a
legitimate user of a list that uses TDMA would get a TDMA query once a
year if they are not subscribed to any ietf.org mail list.  There is no
TDMA query for people who are on at least one ietf.org mail list.

Here is the info that I have:


  Russ wants to know how many people have responded to the TMDA
  challenge but are not on any IETF mailing list.

1025 mail addresses have confirmed their address.  I would bet that
at least 20% of the confirmed are spam addresses (or autoconfirmed
addresses)


Thoughts?


get a documented case (copy of the confirmation email + copy of the spam 
that got through) before jumping to conclusions.


I don't think clearing the list is reasonable without relatively solid 
evidence that there are 200 spammers' addresses in that list.


Interestingly, a confirmation email, with trace headers, is evidence of the 
location of a spammer that is far more solid than most kinds of evidence 
one can gather from just the spam; after all, the spammer was available at 
his MX to get and reply to the confirmation email.


If the spammers were indeed auto-replying, I'd set up a honeypot running 
TMDA so that I could collect their whereabouts


   Harald


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [secdir] secdir review of draft-ietf-dnsop-reflectors-are-evil-04.txt

2007-10-03 Thread Noel Chiappa
 From: [EMAIL PROTECTED]

 Second, you're talking about potentially orders of magnitude more
 data: for each destination, there are worldwide likely hundreds (or
 more) of ISP's which are likely to be viable backbone transits.
 ...
 With ISP's which are directly connected with a customer, one can
 assume that there's an implicit authorization, but what about steps
 past that? If one further assumes that by p connecting to q, p is
 transitively authorizing q (with respect to [destination] A), then
 that can be done with straightforward (albeit complex and expensive)
 security on routing. However, if you go that way, then you lose the
 ability for A to make assertions about which q's are not acceptable.
 However, if you go that way, then you lose the ability for A to 
 assertions about which q's are not acceptable. If you add that back in
 as a policy knob ...

 We have the technology to deal with orders of magnitude more data,
 assuming that the task is delegated to servers, not to routers.

I guess I wasn't explicit enough; I made a reference to straightforward
(albeit complex and expensive) security on routing, referring to automatic
mechanisms, but didn't specifically describe them as automatic; nor did I
specifically refer to the policy knob as being something that was manual.

I'm talking about *configuration* data; i.e. something humans have to enter,
and maintain. The issue is not the mechanical tasks of storing and
distributing the data, but the human effort required to set up it and update
it as needed, plus the likelihood (as always, when people are involved) of
errors being introduced.

Noel

PS: The potential size of the problem is actually worse than I described
above, because there's an additional axis of freedom. Not only do you have to
multiply the number of destinations by the number of backbone transits, you
also have to multiply by the number of destinations *again*, because
destination A may think backbone transit q is fine, with respect to
communicating with B, but not when it's communicating with C. Fundamentally,
destination-vector systems (of which path-vector, such as BGP, are a subset)
are just not suited to doing this kind of stuff.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-03 Thread Sam Hartman
 Stephane == Stephane Bortzmeyer [EMAIL PROTECTED] writes:


Stephane But suggesting ORNS (Open Recursive Name Servers) for
Stephane the solution to this issue is, indeed, a bad idea (do
Stephane note I did not say the N word), for the reasons
Stephane explained in draft-ietf-dnsop-reflectors-are-evil-04.txt
Stephane (reflections attack).

Hmm.  All I get is that suggesting open recursive nameservers has the
harm that it creates reflection attacks.  The current text of section
4 to me says that you SHOULD NOT offer recursive name service by
default and the generic recommendation is that you should not offer
recursive name service to other clients than those you need.  However
if I've evaluated the harm caused by the attack, evaluated the costs
of other solutions and concluded that the best tradeoff is running an
open recursive nameserver, I can do so.  That seems like a balanced
and reasonable approach.

If you intend the draft to same something else, you have some work to
do.

Stephane There are other solutions to this issue and lists have
Stephane already been given in this thread *and* in the I-D we
Stephane discuss. These solutions are TSIG, local caching
Stephane resolvers and VPN. May be there is an editorial problem
Stephane if they are not well explained but the I-D does
Stephane completely cover the issue of romaing users.

People have explained why the cost/benefit tradeoff may not favor
these solutions.  tsig is not realistic in the current software
implementation space; it has promise for the future.  VPN is very
complicated and probably not worth it if all you want is more reliable
nameservice.  (I do understand the man-in-the-middle and transparent
proxy issues).  Caching resolvers are problematic for deployment
complexity reasons .

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Spammers answering TMDA Queries

2007-10-03 Thread Michael Thomas

Brian E Carpenter wrote:

Speaking personally, I think annual reconfirmation is quite reasonable.
The message sent to the user should make it clear that it is an
annual process.


Except... the annual confirmation is probably going to get accidentally
deleted by a lot of people because they think it's the monthly notice.

If this is a real problem, wouldn't it be better to take it up with the 
mailman
folks since I'd expect that it's not just ietf? I've been working with 
them on

dkim related stuff and they are quite reasonable folks. Maybe they have some
ideas on this front.

  Mike

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [secdir] secdir review of draft-ietf-dnsop-reflectors-are-evil-04.txt

2007-10-03 Thread Simon Leinen
Danny McPherson writes:
 Really?  How many ISPs are you aware of that have
 *decommissioned* every piece of routing gear in their
 network in the past 7 years?

I think we're an ISP (AS559), and we don't have any equipment that
would be unable to filter against spoofed source addresses.

In fact I think that even seven years ago all our equipment could do
this.  Yes, I know about certain Engine-N generations of certain
linecards for certain high-end routers, but my sympathy to those
ISPs who still use them is limited.  (Especially with those ISPs that
keep a few in their network just as an excuse for not deploying BCP39
anywhere :-)
-- 
Simon.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Spammers answering TMDA Queries

2007-10-03 Thread Hallam-Baker, Phillip
I don't see a problem if we eat our own dog food.

The use of tdma type tech for mailing list subscriptions has been considered 
best practice for over a decade. Personal use is nasty, brutish and hopefully 
short.

Allowing unsubscribed persons to post after a tdma authentication is a 
courtesy, there is no obligation to extend it in the first place.

Pooling the tdma responses across multiple ietf mailing lists is a further 
courtesy.


There is more we can do here but no more that we should feel obliged to do - 
ecept for the fact that we are a standards organization and should eat the dog 
food.

In particular, sign the messages with dkim and deploy spf.



Sent from my GoodLink Wireless Handheld (www.good.com)

 -Original Message-
From:   Michael Thomas [mailto:[EMAIL PROTECTED]
Sent:   Wednesday, October 03, 2007 08:23 AM Pacific Standard Time
To: Brian E Carpenter
Cc: ietf@ietf.org
Subject:Re: Spammers answering TMDA Queries

Brian E Carpenter wrote:
 Speaking personally, I think annual reconfirmation is quite reasonable.
 The message sent to the user should make it clear that it is an
 annual process.

Except... the annual confirmation is probably going to get accidentally
deleted by a lot of people because they think it's the monthly notice.

If this is a real problem, wouldn't it be better to take it up with the 
mailman
folks since I'd expect that it's not just ietf? I've been working with 
them on
dkim related stuff and they are quite reasonable folks. Maybe they have some
ideas on this front.

   Mike

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Spammers answering TMDA Queries

2007-10-03 Thread Clint Chaplin
I believe the term is tmda, not tdma.

TDMA is a type of cell phone technology.

On 10/3/07, Hallam-Baker, Phillip [EMAIL PROTECTED] wrote:



 I don't see a problem if we eat our own dog food.

  The use of tdma type tech for mailing list subscriptions has been
 considered best practice for over a decade. Personal use is nasty, brutish
 and hopefully short.

  Allowing unsubscribed persons to post after a tdma authentication is a
 courtesy, there is no obligation to extend it in the first place.

  Pooling the tdma responses across multiple ietf mailing lists is a further
 courtesy.


  There is more we can do here but no more that we should feel obliged to do
 - ecept for the fact that we are a standards organization and should eat the
 dog food.

  In particular, sign the messages with dkim and deploy spf.



  Sent from my GoodLink Wireless Handheld (www.good.com)

   -Original Message-
  From:   Michael Thomas [mailto:[EMAIL PROTECTED]
  Sent:   Wednesday, October 03, 2007 08:23 AM Pacific Standard Time
  To: Brian E Carpenter
  Cc: ietf@ietf.org
  Subject:Re: Spammers answering TMDA Queries

  Brian E Carpenter wrote:
   Speaking personally, I think annual reconfirmation is quite reasonable.
   The message sent to the user should make it clear that it is an
   annual process.

  Except... the annual confirmation is probably going to get accidentally
  deleted by a lot of people because they think it's the monthly notice.

  If this is a real problem, wouldn't it be better to take it up with the
  mailman
  folks since I'd expect that it's not just ietf? I've been working with
  them on
  dkim related stuff and they are quite reasonable folks. Maybe they have
 some
  ideas on this front.

 Mike

  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf



 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf




-- 
Clint (JOATMON) Chaplin
Principal Engineer
Corporate Standardization (US)
SISA

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Spammers answering TMDA Queries

2007-10-03 Thread Douglas Otis


On Oct 3, 2007, at 2:59 PM, Hallam-Baker, Phillip wrote:

There is more we can do here but no more that we should feel  
obliged to do - except for the fact that we are a standards  
organization and should eat the dog food.


In particular, sign the messages with dkim and deploy spf.


Few problems should be caused by DKIM, although it might be difficult  
to claim DKIM solves a particular problem affecting IETF mailing lists.


The same is not true for SPF.  SPF is experimental, can be  
problematic, and is very likely unsafe for use with DNS.  SPF carries  
suitable warnings indicating it may cause problems.  SPF may  
interfere with the delivery of forwarded messages.  SPF might be used  
in conjunction with Sender-ID.  Suggested solutions for dealing with  
Sender-ID requires yet another version of SPF be published.  Use of  
which might fall under:
http://www.microsoft.com/downloads/results.aspx? 
pocId=freetext=SenderID_License-Agreement.pdfDisplayLang=en


Possible application of Sender-ID will cause IETF lists to break once  
SPF is published.  The purported use of SPF for curtailing forged  
DSNs requires policy settings which then create new problems.  When  
desired, names rather than address lists should be used to register  
an email path.  A name path approach avoids the dangerous DNS  
transactional issues.  Rather than relying upon unscalable SPF  
address lists, instead an extension might be applied to DKIM.  The  
DKIM extension could offer a means to prevent DSNs from being dropped  
when Mail From domains differ.


http://www1.tools.ietf.org/wg/dkim/draft-otis-dkim-tpa-ssp-01.txt

-Doug


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Protocol Action: 'Applying Signaling Compression (SigComp) to the Session Initiation Protocol (SIP)' to Proposed Standard

2007-10-03 Thread The IESG
The IESG has approved the following document:

- 'Applying Signaling Compression (SigComp) to the Session Initiation 
   Protocol (SIP) '
   draft-ietf-rohc-sigcomp-sip-08.txt as a Proposed Standard

This document is the product of the Robust Header Compression Working 
Group. 

The IESG contact persons are Magnus Westerlund and Lars Eggert.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-rohc-sigcomp-sip-08.txt

Technical Summary

  This document describes some specifics that apply when Signaling
  Compression (SigComp) is applied to the Session Initiation Protocol
  (SIP), such as default minimum values of SigComp parameters,
  compartment and state management, and a few issues on SigComp over
  TCP.  Any implementation of SigComp for use with SIP must conform to
  this document, in addition to SigComp and support of the SIP and
  Session Description Protocol (SDP) static dictionary.

Working Group Summary

  This document has been in the workings for several years, and it has
  been given the time needed to make it mature. The document has
  been carefully reviewed by both the WG and various other SIP and
  SigComp experts, and there is WG consensus that the document
  should now be published as an RFC.

Document Quality

  There are several independent implementers of SigComp, and they
  have collectively developed the content of this specification, based
  on running code experience.

Personnel
   
  Document Sheperd for this document is Lars-Erik Jonsson, and Magnus
  Westerlund is the Responsible Area Director.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce