Re: [dhcwg] Last Call: draft-ietf-dhc-dhcpv6-bulk-leasequery (DHCPv6 Bulk Leasequery) to Proposed Standard

2008-10-21 Thread Pekka Savola
I was hoping some folks more intimate with SNMP and IETF management 
frameworks would chime in here, but I'll respond to clarify:


On Tue, 21 Oct 2008, Marcus wrote:

I am not an expert on SNMP, but the only way I could imagine that
working, would be by using queries for MIBs which would look like
this:

get .

As the query type can be a relay id, link-address or remote id, this
would look a bit strange to me. I know and use SNMP mostly for
querying specific, predefined counters or tables, not variable entries
in the MIB tree.


If I understand what you want to achieve, what you want is supported 
and indeed used by lots of MIB modules out there.  This is useful and 
indeed we use it regularly with e.g. BGP and IP forwarding MIBs:


$ snmpwalk -m IP-FORWARD-MIB -v 2c -c foo foo-rtr 
ip.ipForward.ipCidrRouteTable.ipCidrRouteEntry.ipCidrRouteProto.128.214.46
IP-FORWARD-MIB::ipCidrRouteProto.128.214.46.0.255.255.255.0.0.0.0.0.0 = 
INTEGER: netmgmt(3)
IP-FORWARD-MIB::ipCidrRouteProto.128.214.46.254.255.255.255.255.0.0.0.0.0 = 
INTEGER: local(2)

Also all implementations I know, use UDP not TCP for SNMP queries 
and replies. The DHCPv6 Bulk Leasquery proposal looks like a logical 
next step to me.


An open-source SNMP implementation (net-snmp) is at least available. 
SNMP over TCP is defined in RFC3430. The systems under consideration 
already support TCP, just the TCP SNMP server part is missing; this 
should be trivial to implement if there is a need -- the lack of 
implementation efforts seems like an indication that UDP with 
retransmissions is usually "good enough".


--
Pekka Savola "You each name yourselves king, yet the
Netcore Oykingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Publication track for IBE documents (Was Second Last Call...)

2008-10-21 Thread Stephen Farrell

So while I don't strongly object to these as informational RFCs,
I do wonder why, if only one implementation is ever likely, we
need any RFC at all. Its not like these docs describe something
one couldn't easily figure out were there a need, given that
the (elegant but not especially useful) crypto has been around
for a while without finding any serious applications.

Stephen.

Tim Polk wrote:
> Okay, I fat fingered this one.  The S/MIME WG actually forwarded these
> documents
> with a recommendation that they be published as Informational.  I
> intended to respect
> that consensus, but for one reason or another, they ended up in the
> Tracker marked
> for Standards track.
> 
> It is clear that the WG got this one right, and I have changed the
> intended status on
> both documents to Informational.
> 
> Thanks,
> 
> Tim Polk
> 
>> Harald wrote:
>>
>>> SM wrote:
>>>
>>>
 At 05:37 20-10-2008, The IESG wrote:
 This is a second last call for consideration of the following document
 from the S/MIME Mail Security WG (smime):

 - 'Using the Boneh-Franklin and Boneh-Boyen identity-based Encryption
Algorithms with the Cryptographic Message Syntax (CMS) '
 as a Proposed Standard

 Technical issues raised in IETF Last Call and IESG evaluation have been
 resolved.  However, there have been substantive changes in the relevant
 IPR disclosures statements since the review process was initiated.
 Specifically, IPR disclosure statement #888,
(see https://datatracker.ietf.org/ipr/888/)
 was replaced by PR disclosure statement #950,
(see https://datatracker.ietf.org/ipr/950/)

 This Last Call is intended to confirm continued community support in
 light of the new IPR disclosure statement.  Given the limited scope of
 this Last Call, an abbreviated time period has been selected.

>>>
>>>
>>> Disclosure statement #888 mentions draft-martin-ibcs-08. That I-D was
>>> published as RFC 5091 in December 2007. Disclosure #950 submitted in
>>> May 2008 mentions new licensing terms for RFC 5091. That disclosure
>>> mentions that draft-ietf-smime-bfibecms-10 is on the Informational
>>> Track whereas it is on the Standards Track.
>>>
>>> As there seems to be only one implementation and very little public
>>> discussion about the draft, I don't see why it should be on the
>>> Standards Track.
>>>
>>
>>
>> With licensing terms like these, I would want to see a compelling
>> argument for why the community needs it standardized to put it on the
>> standards track.
>>
>> Let it be informational.
>>
>>  Harald
>>
> 
> 
> 
> 
> 
> 
> 
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
> 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [secdir] Secdir Review of draft-stjohns-sipso-05

2008-10-21 Thread Steven M. Bellovin
On Tue, 21 Oct 2008 16:57:12 -0400
Michael StJohns <[EMAIL PROTECTED]> wrote:

...
 
> Classified documents have this thing called paragraph marking.  Each
> paragraph within a document is marked with the highest level of data
> within the paragraph.  A page is marked with the highest level of
> data in any paragraph on that page.  The overall document is marked
> with and protected at the highest level of data within the document.

Those who want the gory details should see
http://www.fas.org/sgp/isoo/marking.pdf


--Steve Bellovin, http://www.cs.columbia.edu/~smb
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Publication track for IBE documents (Was Second Last Call...)

2008-10-21 Thread Tim Polk
Okay, I fat fingered this one.  The S/MIME WG actually forwarded  
these documents
with a recommendation that they be published as Informational.  I  
intended to respect
that consensus, but for one reason or another, they ended up in the  
Tracker marked

for Standards track.

It is clear that the WG got this one right, and I have changed the  
intended status on

both documents to Informational.

Thanks,

Tim Polk


Harald wrote:


SM wrote:



At 05:37 20-10-2008, The IESG wrote:
This is a second last call for consideration of the following  
document

from the S/MIME Mail Security WG (smime):

- 'Using the Boneh-Franklin and Boneh-Boyen identity-based  
Encryption

   Algorithms with the Cryptographic Message Syntax (CMS) '
as a Proposed Standard

Technical issues raised in IETF Last Call and IESG evaluation  
have been
resolved.  However, there have been substantive changes in the  
relevant

IPR disclosures statements since the review process was initiated.
Specifically, IPR disclosure statement #888,
   (see https://datatracker.ietf.org/ipr/888/)
was replaced by PR disclosure statement #950,
   (see https://datatracker.ietf.org/ipr/950/)

This Last Call is intended to confirm continued community support in
light of the new IPR disclosure statement.  Given the limited  
scope of

this Last Call, an abbreviated time period has been selected.




Disclosure statement #888 mentions draft-martin-ibcs-08. That I-D  
was published as RFC 5091 in December 2007. Disclosure #950  
submitted in May 2008 mentions new licensing terms for RFC 5091.  
That disclosure mentions that draft-ietf-smime-bfibecms-10 is on  
the Informational Track whereas it is on the Standards Track.


As there seems to be only one implementation and very little  
public discussion about the draft, I don't see why it should be on  
the Standards Track.





With licensing terms like these, I would want to see a compelling  
argument for why the community needs it standardized to put it on  
the standards track.


Let it be informational.

 Harald









___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [secdir] Secdir Review of draft-stjohns-sipso-05

2008-10-21 Thread Michael StJohns
At 09:44 PM 10/20/2008, Nicolas Williams wrote:
>So if I understand correctly then this document would have an
>implementation of, say, NFSv4[0] over TCP[1] send TCP packets for the
>same TCP connection with different labels, *and* ensure that each packet
>contains parts of no more than one (exactly one) NFSv4 RPC.

Classified documents have this thing called paragraph marking.  Each paragraph 
within a document is marked with the highest level of data within the 
paragraph.  A page is marked with the highest level of data in any paragraph on 
that page.  The overall document is marked with and protected at the highest 
level of data within the document.

For your example, what would probably happen is that the NFS processes on both 
sides would create a connection at the highest level of data they expect to 
exchange.  The NFS processes would be responsible for the labeling and 
segregation of data exchanged over that connection.  E.g. the IP packets would 
ALL be labeled at the high level, even if some of them carried data at a level 
below.



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [secdir] Secdir Review of draft-stjohns-sipso-05

2008-10-21 Thread Russ Housley

Nico:


So if I understand correctly then this document would have an
implementation of, say, NFSv4[0] over TCP[1] send TCP packets for the
same TCP connection with different labels, *and* ensure that each packet
contains parts of no more than one (exactly one) NFSv4 RPC.


I am aware of several multi-level secure implementations; none of 
them of make any attempt to do anything like this.


Russ

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Call for Comments: On RFC Streams, Headers, and Boilerplates

2008-10-21 Thread Brian E Carpenter
On 2008-10-21 23:00, IAB Chair wrote:
> Dear Colleagues,
> 
> The IAB intends to publish the following document and invites any
> comments you might have:
> 
>   "On RFC Streams, Headers, and Boilerplates"
>draft-iab-streams-headers-boilerplates-03 [1]
> 

I think this is ready to publish, except for one nit:

 This memo is not an Internet Standards Track specification, .

s/,/;/

Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-housley-iesg-rfc3932bis (IESG Procedures for Handling of Independent and IRTF Stream Submissions) to BCP

2008-10-21 Thread Brian E Carpenter
I'm happy with this version. I think it updates the procedures in
accordance with what we've learned since RFC3932.

   Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] Last Call: draft-ietf-dhc-dhcpv6-bulk-leasequery (DHCPv6 Bulk Leasequery) to Proposed Standard

2008-10-21 Thread Marcus
On Tue, Oct 21, 2008 at 8:09 AM, Pekka Savola <[EMAIL PROTECTED]> wrote:
>
> On Mon, 20 Oct 2008, The IESG wrote:
>>
>> The IESG has received a request from the Dynamic Host Configuration WG
>> (dhc) to consider the following document:
>>
>> - 'DHCPv6 Bulk Leasequery '
>>   as a Proposed Standard
>>
>> The IESG plans to make a decision in the next few weeks, and solicits
>> final comments on this action.  Please send substantive comments to the
>> ietf@ietf.org mailing lists by 2008-11-03. Exceptionally,
>> comments may be sent to [EMAIL PROTECTED] instead. In either case, please
>> retain the beginning of the Subject line to allow automated sorting.
>>
>> The file can be obtained via
>> http://www.ietf.org/internet-drafts/draft-ietf-dhc-dhcpv6-bulk-leasequery-04.txt
>
> First there was DHC Leasequery (RFC4388), next DHCv6 Leasequery (RFC5007), 
> now we have DHCv6 Bulk Leasequery.  And someone seems to be proposing DHCPv4 
> bulk leasequery as well (draft-dtv-dhc-dhcpv4-bulk-leasequery).
>
> RFC4388 S4.2 described reasons why SNMP was deemed inappropriate. And if you 
> look at the reasoning there, some of these are not even valid anymore for 
> bulk leasequeries.  I remain unconvinced.  A far better solution would seem 
> to be define a smaller MIB just for querying leases so implementing it would 
> be trivial.  Bulk leasequeries just underline the fact that SNMP and MIB data 
> models are being reinvented inside DHCP.
>
> --
> Pekka Savola "You each name yourselves king, yet the
> Netcore Oykingdom bleeds."
> Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

I am not an expert on SNMP, but the only way I could imagine that
working, would be by using queries for MIBs which would look like
this:

get .

As the query type can be a relay id, link-address or remote id, this
would look a bit strange to me. I know and use SNMP mostly for
querying specific, predefined counters or tables, not variable entries
in the MIB tree. Also all implementations I know, use UDP not TCP for
SNMP queries and replies.
The DHCPv6 Bulk Leasquery proposal looks like a logical next step to me.

Marcus
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [secdir] Secdir Review of draft-stjohns-sipso-05

2008-10-21 Thread Nicolas Williams
On thing that sticks out from the Introduction is this:

|  However, some applications (e.g. distributed file systems),
|   most often those not designed for use with Compartmented Mode
|   Workstations or other Multi-Level Secure (MLS) computers,
|   multiplex different transactions at different sensitivity levels
|   and/or with different privileges over a single IP communications
|   session (e.g. with the User Datagram Protocol).

So far so good, and certainly true.  But then:

|In order to
|   maintain data Sensitivity Labeling for such applications, in
|   order to be able to implement routing and Mandatory Access
|   Control decisions in routers and guards on a per-IP-packet basis,
|   and for other reasons, there is a need to have a mechanism for
|   explicitly labeling the sensitivity information for each IPv6
|   packet.


So if I understand correctly then this document would have an
implementation of, say, NFSv4[0] over TCP[1] send TCP packets for the
same TCP connection with different labels, *and* ensure that each packet
contains parts of no more than one (exactly one) NFSv4 RPC.

Surely that would have an enormous impact on transport protocol
implementations!

And all so that middle boxes can make labelled routing decisions at
100Gbps wire speed.  And these are not simple labels either.

And the middle boxes have to trust the end nodes to get the labelling
right.

Call me a skeptic.  I don't see this flying.

In any case, wouldn't it be easier to just use IPsec with labelled SAs
(with no outer packet labelling) and let the middle boxes be label
agnostic?  The end nodes still have to be trusted to get the labelling
right, but this way you free the middle boxes to do what they're good at
(routing) and use crypto to provide integrity and confidentiality
protection over any public networks.

And if you really must have outer packet labelling for middle boxes to
inspect, why not modify NFSv4 clients to use a TCP connection per-local
{user, label}?  That'd certainly be a lot less troublesome than to
modify TCP to keep track of labels in a PCB's buffers/arrange to send
each sub-buffer in a separate packet or train of packets!

The changes proposed in this I-D are non-trivial, but there are clearly
far simpler alternatives.

Nico


[0] "e.g. distributed file systems"?  NFSv4 qualifies.

[1] "multiplex different transactions... over a single IP communications
session (e.g. with the User Datagram Protocol)"?  NFSv4 qualifies,
though the mandatory-to- implement transport for NFSv4 is TCP, not
UDP.
-- 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Second Last Call: draft-ietf-smime-bfibecms (Using the Boneh-Franklin and Boneh-Boyen identity-based Encryption Algorithms with the Cryptographic Message Syntax (CMS)) to Proposed Standard

2008-10-21 Thread Harald Alvestrand

SM wrote:

At 05:37 20-10-2008, The IESG wrote:

This is a second last call for consideration of the following document
from the S/MIME Mail Security WG (smime):

- 'Using the Boneh-Franklin and Boneh-Boyen identity-based Encryption
   Algorithms with the Cryptographic Message Syntax (CMS) '
as a Proposed Standard

Technical issues raised in IETF Last Call and IESG evaluation have been
resolved.  However, there have been substantive changes in the relevant
IPR disclosures statements since the review process was initiated.
Specifically, IPR disclosure statement #888,
   (see https://datatracker.ietf.org/ipr/888/)
was replaced by PR disclosure statement #950,
   (see https://datatracker.ietf.org/ipr/950/)

This Last Call is intended to confirm continued community support in
light of the new IPR disclosure statement.  Given the limited scope of
this Last Call, an abbreviated time period has been selected.


Disclosure statement #888 mentions draft-martin-ibcs-08.  That I-D was 
published as RFC 5091 in December 2007.   Disclosure #950 submitted in 
May 2008 mentions new licensing terms for RFC 5091.  That disclosure 
mentions that draft-ietf-smime-bfibecms-10 is on the Informational 
Track whereas it is on the Standards Track.


As there seems to be only one implementation and very little public 
discussion about the draft, I don't see why it should be on the 
Standards Track. 
With licensing terms like these, I would want to see a compelling 
argument for why the community needs it standardized to put it on the 
standards track.


Let it be informational.

 Harald

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Openness for IETF-sponsored events

2008-10-21 Thread Andrew G. Malis
Ted,

I was at the workshop representing the IAB, and I fully agree. While
it was held in a good-sized auditorium, given the obvious interest in
the topic, if everyone who wanted to attend or get on the agenda
could, we would have needed a venue two or three times the size, more
administrative support, and probably have needed to extend the
workshop over at least two days. Given the size of the venue and the
time available, I thought the way the workshop was conducted was
extremely reasonable and fair.

Cheers,
Andy

On Mon, Oct 20, 2008 at 1:05 PM, Ted Hardie <[EMAIL PROTECTED]> wrote:
> Howdy,
>There has been a lot of traffic in the past few days on
> the question of whether the recent p2pi workshop was or was not
> "open".  Having sent a paper in to that workshop and participated
> in an apps-area workshop, I'd like to weigh in on the question with
> a fairly blunt reply:  not fully.  Whenever participation is gated
> by a committee, it is not fully open.  In the p2pi case, Jon and Cullen
> acted as the gates; they swung wide (thanks, guys!), but you
> had to either submit a position paper and have it approved by
> them or get a waiver from them.  To quote from their mail of
> May 2nd:
>
>>We've had a number of inquiries from people interested in the workshop
>>who are reluctant to submit a paper because they have no particular
>>agenda to push in this space. We'd like to stress that position papers
>>can shed light on any aspect of the problem or solution space, and we'd
>>encourage anyone interested in making a technical contribution to
>>ongoing work in this space at the IETF to submit a paper even if it
>>serves only to further explain the problem, the requirements, or even
>>the non-requirements associated with this work.
>>
>>That much said, if it is not appropriate for you to submit a position
>>paper, please contact Cullen and Jon by May 9th to request a waiver. You
>>can reach us at: [EMAIL PROTECTED], [EMAIL PROTECTED]
>
>That doesn't really matter, though.  What matters is that
> workshops like this are inputs into an open process (in this case, the BoF, in
> the APPs workshop a list of potential work items).  Anyone could
> participate in the BoF or on the mailing list, and that is where we
> have to make sure that the full openness remains.  The discussion
> now of the scope of the work in this proposed working group is a
> critical part of that openness, as it is *the* time early in the process
> when the IETF community as a whole considers a proposed
> work plan and commits to it.  ALTO is getting very good feedback,
> and I hope that its Area Directors (and any potential chairs) are
> listening to it; it's heartening to see the level of interest here when
> so many WGs are chartered or re-chartered with no comments at all.
>
>I hope we can stop focusing on the openness of the workshop
> as a primary topic in this conversation, and focus on keeping the
> proposed working group open to input at this pivotal moment.  Having
> hummed for the creation of the WG at the BoF, I obviously support the
> creation of a WG now.  But I'm much, much happier getting the input
> on charter details dealt with now, as a good discussion now can avoid
> lots of later stress on the working group machinery.
>
>regards,
>Ted Hardie
>
> ___
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


last call on draft-ietf-smime-bfibecms and draft-ietf-smime-ibearch

2008-10-21 Thread Simon Josefsson
I am opposed to publishing these two documents on the standards track.

The licensing information in the patent disclosure #950 makes it clear
to me that free software implementations of the specifications, suitable
for inclusion into free operating systems like Debian or gNewSense, are
not permitted or possible.

I am concerned that the license terms in the #888 patent disclosure,
applying to an I-D that were published as RFC 5091, is significantly
different to the terms in the #950 patent disclosure.  The terms in #950
claims to apply to RFC 5091 as well.  So was RFC 5091 published as an
RFC without public knowledge of the patent situation?  Considering #950,
that appears to be the case.

According to the datatracker, the #950 disclosure does not replace the
#888 disclosure.  Is this an error in the datatracker or the last call
announcement?  I believe it is important to understand which of these
patent disclosures apply to which documents.

Given that there appears to be little community interest in this
standard, and no free software implementation of it appears possible, I
believe the technology is not ready for the standards track.

Finally, both these documents have normative references to an
Informational document, i.e. RFC 5091.  According to section 3 of RFC
3967 aka BCP97, it seems to me like this needs to be pointed out
explicitly in the IETF last call.

/Simon

The IESG <[EMAIL PROTECTED]> writes:

> This is a second last call for consideration of the following document
> from the S/MIME Mail Security WG (smime):
>
> - 'Using the Boneh-Franklin and Boneh-Boyen identity-based Encryption 
>Algorithms with the Cryptographic Message Syntax (CMS) '
> as a Proposed Standard
>
> Technical issues raised in IETF Last Call and IESG evaluation have been
> resolved.  However, there have been substantive changes in the relevant
> IPR disclosures statements since the review process was initiated. 
> Specifically, IPR disclosure statement #888,
>(see https://datatracker.ietf.org/ipr/888/)
> was replaced by PR disclosure statement #950,
>(see https://datatracker.ietf.org/ipr/950/)
>
> This Last Call is intended to confirm continued community support in
> light of the new IPR disclosure statement.  Given the limited scope of
> this Last Call, an abbreviated time period has been selected.
>
> The IESG plans to make a decision in the next few weeks, and solicits
> final comments on this action.  Please send substantive comments to the
> ietf@ietf.org mailing lists by 2008-10-27. Exceptionally,
> comments may be sent to [EMAIL PROTECTED] instead. In either case, please
> retain the beginning of the Subject line to allow automated sorting.
>
> The file can be obtained via
> http://www.ietf.org/internet-drafts/draft-ietf-smime-bfibecms-10.txt
>
>
> IESG discussion can be tracked via
> https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=14992&rfc_flag=0
>
> ___
> IETF-Announce mailing list
> [EMAIL PROTECTED]
> https://www.ietf.org/mailman/listinfo/ietf-announce

The IESG <[EMAIL PROTECTED]> writes:

> This is a second last call for consideration of the following document
> from the S/MIME Mail Security WG (smime):
>
> - 'Identity-based Encryption Architecture and Supporting Data 
> Structures '
> as a Proposed Standard
>
> Technical issues raised in IETF Last Call and IESG evaluation have been
> resolved.  However, there have been substantive changes in the relevant
> IPR disclosures statements since the review process was initiated. 
> Specifically, IPR disclosure statement #888,
>(see https://datatracker.ietf.org/ipr/888/)
> was replaced by PR disclosure statement #950,
>(see https://datatracker.ietf.org/ipr/950/)
>
> This Last Call is intended to confirm continued community support in
> light of the new IPR disclosure statement.  Given the limited scope of
> this Last Call, an abbreviated time period has been selected.
>
> The IESG plans to make a decision in the next few weeks, and solicits
> final comments on this action.  Please send substantive comments to the
> ietf@ietf.org mailing lists by 2008-10-27. Exceptionally,
> comments may be sent to [EMAIL PROTECTED] instead. In either case, please
> retain the beginning of the Subject line to allow automated sorting.
>
>
> The file can be obtained via
> http://www.ietf.org/internet-drafts/draft-ietf-smime-ibearch-09.txt
>
>
> IESG discussion can be tracked via
> https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=14987&rfc_flag=0
>
> ___
> IETF-Announce mailing list
> [EMAIL PROTECTED]
> https://www.ietf.org/mailman/listinfo/ietf-announce
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Second Last Call: draft-ietf-smime-bfibecms (Using the Boneh-Franklin and Boneh-Boyen identity-based Encryption Algorithms with the Cryptographic Message Syntax (CMS)) to Proposed Standard

2008-10-21 Thread Stephen Farrell


SM wrote:

> As there seems to be only one implementation and very little public
> discussion about the draft, I don't see why it should be on the
> Standards Track.

I don't see any pressing need to publish these at all, especially given
the (unfriendly IMO) IPR disclosure and (what I believe) is the total
lack of any demand for this technology. I'd be for not publishing them.

Is this a case of I-Ds whose only real purpose is to stoke the marketing
machine of the IPR-holders? If so, is that something we should ignore or
push back against?

Stephen.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf