Re: RFC5378 alternate procedure (was: Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary)

2008-12-16 Thread Harald Alvestrand

Material comments:

- Section 3: RFC 5378 expected the date on which 5378 was effective to 
be set by the Trust (section 2.1), and explicitly did not want to cast 
into RFC stone the procedure by which the changeover date was determined.


- I disagree with the decision to allow *all* of a submission, including 
new text, to be 3978-boilerplated. As I've said before, my preferred 
resolution mechanism is to have a mechanism available (probably 
front-page disclaimer + details in the Contributors section) for listing 
pre-5378 sources from which material was copied without 5378 permission 
being granted by the authors.
I believe the continued production of material that is licensed under 
3978 only will be long-term harmful to the state of the IETF's IPR 
confusion.


 Harald

John C Klensin wrote:

Hi.

I've just reposted this draft as
draft-klensin-rfc5378var-01.txt.  I didn't removing the material
I indicated I was going to remove because this version follows
too quickly on the previous one.

There are only two sets of changes, but the first seemed
sufficiently important to be worth a quick update:

(1) Alfred Hoenes caught several places in which I had
transposed digits or otherwise fouled up RFC numbers to which I
was making reference.  This type of work is sufficiently
confusing without that sort of stupid problem, for which I
apologize -- I thought I had proofread it carefully enough but
obviously did not.  They have been fixed.

(2) I realized that it was necessary for completeness to
un-obsolete 3948 and 4748 if they were going to be referenced,
or material from them picked up and copied into, documents, so I
have inserted a paragraph to take care of that.

Anyone who has successful read the -00 version and understood it
can safely ignore this one.  Anyone who has not yet read -00, or
who tried to read it and was confused by the numbering errors,
may find this version more helpful.

Comments are, of course, welcome on either one.

 john

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

  


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: RFC5378 alternate procedure

2008-12-16 Thread Simon Josefsson
John C Klensin john-i...@jck.com writes:

 Hi.

 In an attempt to get this discussion unstuck and to provide a
 way forward for those of us whose reading of 5378 (or advice
 from counsel) have convinced us that we cannot post most
 documents that contain older text written by others under the
 new rules, I've posted a new I-D,
 draft-klensin-rfc5378var-00.txt.

Thanks for trying to do something about this problem.  I've read the -01
document.  It describes a solution that would be very far from a good
copyright situation -- even further away than RFC 5378 alone, given that
RFC 3978 is seriously flawed in some ways.  However, I think your draft
is likely to be one of few approaches that can gain consensus quickly
enough to be an effective solution to the problem you describe.  It
could be a stop-gap measure for the next year or so, until better
copyright policies can be developed.

There is one detail I disagree with rather strongly.  Section 7 suggests
that the Trustees should prepare a replacement for BCP 78.  First, I
don't think the Trustees have the necessary competences or resources to
take on that huge effort.  Further, there is a conflict of interest
here: any policies written by the Trustees is likely to just give more
rights to the IETF Trust That is the problem that caused this situation
to begin with.  I don't believe the output would be representative of
the needs of the wider IETF community.  Instead, I suggest there should
be a wider IETF effort to document the copyright policy that will serve
the IETF better...

...and hopefully such an effort can review some of the bigger pictures
that were declared out of scope in the IPR WG.  One consideration would
then be:

* Whether the two-phase construct with an IETF Trust is a good idea.
  One alternative is to require contributors to release their work under
  a liberal license that allows everyone to copy and modify it.  This
  would avoid the liability issues that are inherent in the IETF Trust
  construct.  This would save money for the IETF.  The license would be
  significantly less complex.

  I agree there are some situations were contributors doesn't find this
  model acceptable.  Just like there are exceptions in the current
  license, there could be a exception in the new license to allow
  exceptions for non-modifiable content.  Compare how the GNU FDL
  license restricts certain parts of a manual to be modified freely.

/Simon
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: The Great Naming Debate (was Re: The internet architecture)

2008-12-16 Thread Hallam-Baker, Phillip
Two points
 
1) Let us bury the idea that more parts reduces reliability. If anyone thinks 
that they do not understand the function of TCP and should go and read some 
basic networking architecture texts. TCP + IP is more reliable than IP. Ergo it 
is entirely possible to onfigure a service such that DNS + TCP + IP is more 
reliable than TCP + IP.
 
It is also possible to design systems such that more layers create less 
reliability.
 
 
2) From an application point of view example.com and 10.1.2.3 may both be 
regarded as names. They are both rendered as an ascii/unicode string. They both 
require translation into IP format.
 
10.1.2.3 is simply a string litteral that may be used in place of a DNS name. 
In neither case should the application require knowledge of the IP address 
itself. In fact you don't want that as at some point in the distant future, 
10.1.2.3 is actually going to map to an IPv6 address, not an IPv4 address.



From: ietf-boun...@ietf.org on behalf of Bryan Ford
Sent: Sun 12/14/2008 2:51 PM
To: Keith Moore
Cc: t...@ietf.org; ietf@ietf.org
Subject: The Great Naming Debate (was Re: The internet architecture)



So, after being distracted by OSDI last week, I'm now trying to catch 
up on the raging debates on TAE that are already exceeding all the 
wildest dreams I had before setting up the list... :)

On the issue of weaning applications (and potentially transports) away 
from IP addresses in favor of names of some kind, I feel that a lot of 
the disagreement results from a misunderstanding of exactly what I 
(and perhaps others who have made similar proposals) was proposing...

On Dec 4, 2008, at 10:29 PM, Keith Moore wrote:
 Hallam-Baker, Phillip wrote:
 I am trying to parse this claim.

 Are you saying that the DNS is fragile and raw IP relatively robust?

 DNS is layered on top of IP.  So for a large class of IP failures, DNS
 won't work either.  And if IP routing fails, DNS is likely to be
 irrelevant because the application using DNS won't work anyway.

 And in practice, DNS is quite likely to fail due to configuration
 errors, inadequate provisioning, outdated cache entries due to
 unanticipated changes, brain-damaged DNS caches built into NATs, 
 failure
 of registries to transfer a DNS name in a timely fashion, etc.

 So it's not a question of whether DNS is less reliable than IP (it 
 is),
 or even whether the reliability of DNS + IP is less than that of IP
 alone (it is).  It's a question of whether increasing reliance on 
 DNS by
 trying to get apps and other things to use DNS names exclusively, 
 makes
 those apps and other things less reliable.  And I'd argue that it 
 does,
 except perhaps in a world where renumbering happened frequently, at
 irregular intervals, and without notice.  And I don't think that's a
 realistic scenario.

I entirely agree in principle with your concerns about reliability: if 
everything has to work correctly in two layers (DNS and IP), then 
that's strictly less likely to happen than hoping everything will work 
correctly in only one layer (just IP) - unless DNS can somehow make up 
for unreliability in the IP layer, which it occasionally might be able 
to do with some effort (e.g., via DNS-based load balancers that take 
end-to-end IP reachability information as input), but it usually 
doesn't because that's not the purpose of DNS.  And I agree that some 
applications (and some users) sometimes need to deal with IP addresses 
directly, and probably still will need to for a long time, maybe 
forever.  You seem to be assuming that my proposal was to disallow 
such visibility into the network entirely, but that wasn't my intent 
at all.  I just would like it to become no longer _mandatory_ for 
every application to know about the structure IP addresses in order to 
accomplish anything.

To be specific, there are (at least) three positions we might be in:

1. ALL applications MUST know about IP addresses, in each IP address 
format that exists, in order to operate at all.  This is the current 
state of the world for applications that use the sockets API, because 
apps have to call gethostbyname etc. and copy the resulting IP 
address(es) into sockaddr_in or sockaddr_in6 structs to pass to 
connect() et al.  Even though the sockets API is generic in that it 
supports multiple address families, its design forces the application 
to have code specific to each family in order to support that family 
at all, which is the key problem.

2. ALL applications MUST use only DNS names for all operations, and 
never provide or see IP addresses for any reason.  This seems to be 
what you're assuming I'm suggesting (i.e., where you say ...by trying 
to get apps and other things to use DNS names exclusively).  
That's a world we might hold up as an ideal to strive for eventually, 
but it's indeed not realistic in the short term, and it's not what I'm 
pushing for.  Besides, there may be many different naming or host 
identity 

Gen-ART Last Call review of draft-ietf-ospf-manet-mdr-03.txt

2008-12-16 Thread Spencer Dawkins

I have been selected as the General Area Review Team (Gen-ART) reviewer for
this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html). Please resolve
these comments along with any other Last Call comments you may receive.

Document: draft-ietf-ospf-manet-mdr-03.txt
Reviewer: Spencer Dawkins
Review Date: 2008-12-12
IETF LC End Date: 2008-12-24
IESG Telechat date: (not known)
Summary: This draft is on the right track for publication as Experimental. I 
have a small number of questions, listed below.


Comments:

2.6.  Hello Protocol

  Differential Hellos are sent every HelloInterval seconds, except when
  full Hellos are sent, which happens once every 2HopRefresh Hellos.

Spencer (clarity): Is 2HopRefresh a counter? As I continue reading, it seems
to be treated as a counter, but that wasn't clear to me at this point in the
document (I think I caught up in Section 4.1, but that's later than I'd
hoped)

  The default value of 2HopRefresh is 1, i.e., the default is to send
  only full Hellos.  The default value for HelloInterval is 2 seconds.
  Differential Hellos are used to reduce overhead and to allow Hellos
  to be sent more frequently, for faster reaction to topology changes.

3.2.  New Configurable Interface Parameters

  All possible configurations of the new interface parameters are
  functional, except that if AdjConnectivity is 0 (full-topology
  adjacencies), then LSAFullness must be 1, 2, or 4 (see Section 9.3).
  Differential Hellos should be used to reduce the size of Hello
  packets when the average number of neighbors is large.  Differential

Spencer (clarity): does large have any relationship with 160 or 200
nodes mentioned in the next paragraph?

  Hellos are obtained by setting the parameter 2HopRefresh to an
  integer greater than 1, with the recommended value being 3.  Good
  performance in simulated mobile networks with up to 160 nodes has
  been obtained using the default configuration with differential
  Hellos.  Good performance in simulated mobile networks with up to 200
  nodes has been obtained using the same configuration except with
  minimal LSAs (LSAFullness = 0).  Simulation results are presented in
  Appendix E.

  MDRConstraint
 A parameter of the MDR selection algorithm, which affects the
 number of MDRs selected.  The default value of 3 results in nearly
 the minimum number of MDRs.  The optional value 2 results in a
 larger number of MDRs.

Spencer(clarity): are 3 and 2 the only possible values for this
parameter? If so, that's fine, but the chosen values made me wonder about
other possible values...

12.  IANA Considerations

  This document defines three new LLS TLV types to be allocated by
  IANA: MDR-Hello TLV, MDR-Metric TLV, and MDR-DD TLV.

Spencer (clarity): it would be good to point to the definitions in this 
section.


D.  Non-Ackable LSAs for Periodic Flooding

  In a highly mobile network, it is possible that a router almost
  always originates a new router-LSA every MinLSInterval seconds.  In
  this case, it should not be necessary to send Acks for such an LSA,
  or to retransmit such an LSA as a unicast, or to describe such an LSA
  in a DD packet.  In this case, the originator of an LSA MAY indicate
  that the router-LSA is non-ackable by setting a bit (to be
  specified) in the options field of the LSA.  For example, a router

Spencer: to be specified? Is this the L bit described in A.1?

  can originate non-ackable LSAs if it determines (e.g., based on an
  exponential moving average) that a new LSA is originated every
  MinLSInterval seconds at least 90 percent of the time. (Simulations
  can be used to determine the best threshold.) 



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: RFC5378 alternate procedure (was: Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary)

2008-12-16 Thread John C Klensin
(in the interest of efficiency, I'm going to respond to Harald's
and Simon's comments in a single note and pick up one of
Hector's remarks in the process)

Harald,

--On Tuesday, 16 December, 2008 09:53 +0100 Harald Alvestrand
har...@alvestrand.no wrote:

 Material comments:
 
 - Section 3: RFC 5378 expected the date on which 5378 was
 effective to be set by the Trust (section 2.1), and explicitly
 did not want to cast into RFC stone the procedure by which the
 changeover date was determined.

I understand that.  I even believe that the WG decision in that
regard, reflected in 5378, was correct in that regard.   But we
have ended up in a situation in which reasonable people,
apparently even practicing attorney-type reasonable people,
disagree on the actual effective changeover date and its
validity.  Except as an example of we don't do this at all
well (see below), why that happened is not particularly
interesting compared to the importance of properly identifying
and solving, or at least working around, the problem.

 - I disagree with the decision to allow *all* of a submission,
 including new text, to be 3978-boilerplated. As I've said
 before, my preferred resolution mechanism is to have a
 mechanism available (probably front-page disclaimer + details
 in the Contributors section) for listing pre-5378 sources from
 which material was copied without 5378 permission being
 granted by the authors.
 I believe the continued production of material that is
 licensed under 3978 only will be long-term harmful to the
 state of the IETF's IPR confusion.

I tried to say this in the document, but obviously not clearly
enough.   I believe that the right long-term strategy is some
sort of hybrid in which earlier text is somehow grandfathered
and newer text falls under the newer rules.  That is desirable
not only for the reason you cite but because, as Simon points
out, 3978 has its own set of problems that we should not
perpetuate any longer or more than necessary.

_However_ there are two problems with a hybrid strategy.  The
first is that I see almost no chance that we could develop that
necessary model, plan, and documentation quickly and get it
right (see below).  I believe that, if 5378 is taken seriously
and is the only permitted posting mode after today, that a
number of document and WG efforts are simply going to come to a
halt until we get a workaround in place.   The just use 3978
until we get this sorted out model of the I-D is a proposal for
that (I hope temporary) workaround; it is not a suggestion for a
permanent solution.  

The second is an issue on which I think we need advice from the
Trustees and from Counsel and then time to consider and discuss
that advice.  To a first approximation, the IPR in a document
completely created under 5378 rules is extremely easy to
understand and administer: the Trust owns the thing and all
rights to use it, even for IETF development purposes, derive
from licenses granted by the Trust.  Similarly, and again to a
first approximation, the IPR in the document completely created
under 3978 or its predecessors is easy to understand and
administer: the IETF can use the document any way it needs/wants
to, anyone can copy, distribute, etc.,  and anyone with another
use must seek out the authors for permission.   

A document that contains both 3978 (or earlier) material and
5378 material is a much more complex proposition.   Obviously,
the Trust can't grant rights it doesn't have.  Probably a grant
from the Trust that says you can do X with any part of the
document we control, but for anything else you have to have to
contact the authors, and we can't tell you which is which is
the worst of both worlds... one in which anyone who is being
conservative will feel a need to obtain both a license from the
Trust _and_ licenses from the authors/ Contributors.   Does that
mean that, to do a hybrid document, we will have to label each
paragraph with its authorship/ 5378 status?   I don't know, and
that is where consultation with Counsel is needed.  One we get
those answers, we can start figuring out the tradeoffs and what
we _really_ want.But I am certain we won't be able to figure
that out and get it right this week, or even this year.


Simon,

--On Tuesday, 16 December, 2008 15:03 +0100 Simon Josefsson
si...@josefsson.org wrote:

...
 Thanks for trying to do something about this problem.  I've
 read the -01 document.  It describes a solution that would be
 very far from a good copyright situation -- even further away
 than RFC 5378 alone, given that RFC 3978 is seriously flawed
 in some ways.  However, I think your draft is likely to be one
 of few approaches that can gain consensus quickly enough to be
 an effective solution to the problem you describe.  It could
 be a stop-gap measure for the next year or so, until better
 copyright policies can be developed.

That is really all I intend -- something that can get us out of
this hole, that could be adopted and implemented 

Re: RFC5378 alternate procedure (was: Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary)

2008-12-16 Thread Thomas Narten
Cullen Jennings flu...@cisco.com writes:

 I believe it would allow us to continue work where the text had been  
 provided under the 3978 rules. Without something like this, I don't  
 know how I can submit new versions of  the WG internet drafts that I  
 am an co-author of. I can not even figure out who are all the people  
 that contributed significant text to the WG drafts much less imagine  
 how I will get permission from all of them to submit the draft under  
 the the 5378 rules.

Question. It is my understanding/assumption that the ONLY parties that
one must clearance from are the actual listed authors of the
document. Specifically, one does NOT need to go back to everyone who
might have contributed text. That, at least, is how we seem to have
been operating for a long time, i.e, it is only the listed authors
that matter.
 
Having said that, things might be murkier than that if one looks at an
acknowledgment section to find everyone who might have contributed
significant text.

I.e., when incorporating comments from individuals in WGs, those
contributions are covered by the NOTE WELL. Does the NOTE WELL also
need to be extended to cover the expanded rights case?  Please say no!

Thomas
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: RFC5378 alternate procedure

2008-12-16 Thread Simon Josefsson
Thomas Narten nar...@us.ibm.com writes:

 Cullen Jennings flu...@cisco.com writes:

 I believe it would allow us to continue work where the text had been  
 provided under the 3978 rules. Without something like this, I don't  
 know how I can submit new versions of  the WG internet drafts that I  
 am an co-author of. I can not even figure out who are all the people  
 that contributed significant text to the WG drafts much less imagine  
 how I will get permission from all of them to submit the draft under  
 the the 5378 rules.

 Question. It is my understanding/assumption that the ONLY parties that
 one must clearance from are the actual listed authors of the
 document. Specifically, one does NOT need to go back to everyone who
 might have contributed text. That, at least, is how we seem to have
 been operating for a long time, i.e, it is only the listed authors
 that matter.

I don't believe that is correct in this context -- I believe what
matters here is getting the necessary copyright from each respective
copyright holder (for work large enough to be copyrightable).  The IETF
policies has been (and remain) that the copyright remains with the
contributor (or possibly his/her employer for work-for-profit
contributions).  Since old contributions were only given to the IETF
under the RFC 3978 (or earlier) license, they need to grant the rights
in RFC 5378 too, before it can be used under the RFC 5378 rules.

Re-reading the initial answer to Sam's question, it uses the word
contributor which is defined in BCP 78, and is not the same as
author.  That is consistent with my view, however it would be useful
to get more thoughts on what the answer is here.

Btw, the FSF uses a limit of ten lines of text/code as a rough limit for
when a copyright assignment is necessary.  The FSF is probably
conservative here though.  I suppose a similar limit is applicable when
you need to contact the original contributor.

 Having said that, things might be murkier than that if one looks at an
 acknowledgment section to find everyone who might have contributed
 significant text.

Indeed.

 I.e., when incorporating comments from individuals in WGs, those
 contributions are covered by the NOTE WELL. Does the NOTE WELL also
 need to be extended to cover the expanded rights case?  Please say no!

The NOTE WELL refers to BCP 78 so it is has already been extended to
cover the new expanded rights, hasn't it?

/Simon
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [tae] The Great Naming Debate (was Re: The internet architecture)

2008-12-16 Thread Keith Moore
Hallam-Baker, Phillip wrote:
 So to be strictly accurate here, applications deal in names, some of
 which are DNS names and some of which are IP address litterals. But an
 'end user' application only deals in names.

how many people are pure end users who never need their tools to be
able to deal with IP address literals?  nobody that I know of.  even
naive users who don't understand what IP addresses do, need for their
apps to be able to deal with them for the cases where things break.  for
instance, when the external network connection goes down and they still
want to be able to talk to their printers. [*]

actually the vast majority of users that I know of do occasionally deal
with IP addresses directly.  and many of these guys aren't computer
scientists or techies of any sort.

again, this is not only hopelessly naive, it's harmful.  you're trying
to build a system that's even more broken than what we have now.

we're a very long way from knowing how to build a naming system that
works so reliably and transparently that we can completely hide IP
addresses from users.

Keith

[*] and yeah, I know about LLMNR and even use it occasionally, but it
also breaks when you take your laptop on the road and still want to be
able to print to the printer at home.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary

2008-12-16 Thread Dave CROCKER



Cullen Jennings wrote:


On Dec 12, 2008, at 1:07 PM, Russ Housley wrote:


This was the consensus of the IPR WG and the IETF,


I doubt the IPR WG really fully thought about this or understood it. If 
someone who was deeply involved can provide definitive evidence of this 
one way or the other that would be great. I am pretty sure this was not 
widely understood when it was IETF LC and I very confident it was not 
understood by the IESG when when they approved it.



Indeed.  But more importantly, this sub-thread naturally and inevitably reduces 
down to an infinite, entirely unproductive finger-pointing game.


We have a reality that the new IPR rules are fundamentally problematic.  Prior 
to their imposition, we had a functioning system.  Now we don't.


And the only thing that changed was imposition of the new rules.  Nothing else 
happened.


The proposals are mostly about adding another layer of 'fix' to what was 
supposed, itself, to be an incremental fix.  The odds that we will get that 
additional layer wrong are demonstrably high.


We should, instead, re-invoke the previous rules, until we figure out how to 
make the correct changes.


d/

--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: RFC5378 alternate procedure

2008-12-16 Thread Sam Hartman
 Simon == Simon Josefsson si...@josefsson.org writes:

  Question. It is my understanding/assumption that the ONLY
 parties that one must clearance from are the actual listed
 authors of the document. Specifically, one does NOT need to go
 back to everyone who might have contributed text. That, at
 least, is how we seem to have been operating for a long time,
 i.e, it is only the listed authors that matter.

Simon I don't believe that is correct in this context -- I
Simon believe what matters here is getting the necessary
Simon copyright from each respective copyright holder (for work
Simon large enough to be copyrightable).  The IETF policies has
Simon been (and remain) that the copyright remains with the
Simon contributor (or possibly his/her 

I agree completely.

I'll note that it may well be reasonable to assume that small text is
fair use.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary

2008-12-16 Thread John C Klensin
Dave,

--On Tuesday, 16 December, 2008 10:26 -0800 Dave CROCKER
d...@dcrocker.net wrote:

 Indeed.  But more importantly, this sub-thread naturally and
 inevitably reduces down to an infinite, entirely unproductive
 finger-pointing game.

For various reasons, I don't believe that game is infinite.  I
believe that we all had the opportunity to identify these
problems during Last Call or earlier and that no one did a
careful enough review.  That means that the finger points to
either everyone participating in the IETF or to the fundamental
process we use to review and approve this type of documents.
Neither is infinite, but it makes the exercise even more
non-productive.

 We have a reality that the new IPR rules are fundamentally
 problematic.  Prior to their imposition, we had a functioning
 system.  Now we don't.
 
 And the only thing that changed was imposition of the new
 rules.  Nothing else happened.
 
 The proposals are mostly about adding another layer of 'fix'
 to what was supposed, itself, to be an incremental fix.  The
 odds that we will get that additional layer wrong are
 demonstrably high.

And that is precisely why my I-D turns things into a choice
between new rules and old rules, based only on the conclusion of
the submitter about what is important... and why it does not
attempt to fix 5378.  I agree with you about the odds of
getting an additional layer right, especially so if we try to do
it quickly.

 We should, instead, re-invoke the previous rules, until we
 figure out how to make the correct changes.

Yes, just suspend 5378 until we get this sorted out and then,
if necessary, repeal it and start over did occur to me.  I
tried to suggest last week that the IAOC and Trustees figure out
a way to do just that, if necessary generating a pro-forma
appeal of something that would permit the IESG to take an
equivalent action.  If I correctly understand the responses we
received, that wasn't believed to be possible.   The Trustees
have advice of Counsel (who is also a co-author of 5378) and I
don't in that matter, so, if they concluded that they couldn't
figure out a way to defer 5378 and reinvoke the previous rules,
I think we need to accept that and move on.

Of course, we could generate an I-D whose only substantive text
was either

move 5378 to historic and un-obsolete 3978 and 4749

or

suspend application of 5378 until some specified
condition happens.

I know how to write the first.  I don't know how to write the
second, but maybe someone else does.

I took the path that my I-D specifies because I concluded that
we have gotten into a place in which re-invoking the old rules
is not possible.  With the usual IANAL disclaimers, it appears
to me that we are in the following situation:

* Documents have been posted with RFC 5378 language.

* At least some of the Trustees believe, presumably on
advice of Counsel, that RFC 5378 has been in effect
since November 10, that everything done in the IETF
since November 10 is covered by it, including everything
that happened during IETF 73, and that 3978 became
obsolete and of no effect on that date.  It appears that
all RFCs posted after that date carry the 5378 language.
While some of us have a bit of trouble with the logic on
which that belief  is based, we know that legal logic is
sometimes different from normal logic and assume that
any controversy about 5378 effectiveness would not be
resolved until settled by a court.   I can't speak for
others, but I don't want to go near that solution if it
can be avoided.

* Ignoring all of the non-IETF uses for the moment, RFC
5378 is not a linear descendant of 3978 and its
predecessors, but a change in direction from authors
grant rights to the IETF and its participants to
authors grant rights to the IETF Trust, which then
grants rights back to IETF participants so we can do
work.  If we suspend or repeal 5378 to re-invoke the
previous rules, it appears to me that any documents
covered by the 5378 rules fall into a strange
never-never land in which the IETF may have _no_ rights
to them at all.  Remembering that set of documents
contains anything from several RFCs and I-Ds to all of
IETF history since before IETF 73, that is an
unattractive situation, to put it mildly.

* One could argue that everything published or
contributed between November 10 and now is still covered
by the (old) Note Well and hence that the old rules are
still in effect in parallel to the rules of 5378, i.e.,
that Contributors are making both the old grant direct
to IETF participants and the new grant to the IETF
Trust.  That position would be a little inconsistent
with the assertion that 3978 

RE: tsv-dir review of draft-ietf-mext-nemo-v4traversal-06.txt

2008-12-16 Thread Dan Wing
 

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On 
 Behalf Of Hesham Soliman
 Sent: Monday, December 01, 2008 2:33 AM
 To: Colin Perkins
 Cc: TSV Dir; ietf@ietf.org; m...@ietf.org
 Subject: Re: tsv-dir review of draft-ietf-mext-nemo-v4traversal-06.txt
 
 Thanks Colin,
 
 I agree with your rationale but I wonder if we need to 
 support every broken
 device out there. In any case, if we have to, I prefer to 
 require encryption
 than to add the XORED address option. I'd like to hear what 
 people in MEXT
 think about this, comments from MEXT?

(catching up on email after a long vacation; sorry for the delay.)

FYI, Teredo also found NATs that meddled with IP addresses on
32 bit boundaries.  From RFC4380,

   Other investigation in the behavior of NAT also outlined the
   probabilistic rewrite behavior.  Some brands of NAT will examine
   all packets for embedded addresses, IP addresses, and port numbers
   present in application payloads.  They will systematically replace
   32-bit values that match a local address by the corresponding mapped
   address.  The Teredo specification includes an obfuscation
   procedure in order to avoid this behavior.

-d


 Hesham
 
 
 On 1/12/08 9:13 PM, Colin Perkins c...@csperkins.org wrote:
 
  On 1 Dec 2008, at 09:00, Hesham Soliman wrote:
  = Well, I'm not sure how a NAT can do that. You mean 
 the NAT will
  parse the binding update message deep inside the IPv6 extension
  header in the inner IP packet? This is where the original address
  is preserved. To do that, a NAT would have to understand the
  various MIPv6 options, and if it did, it would know not to do
  that :) The inner header is IPv6, so a NAT should not touch that.
  
  My understanding from the STUN work is that NATs have 
 been observed
  which rewrite any sequence of four aligned bytes matching 
 the source
  IP address, irrespective of its location within the 
 packet (section
  15.2 of RFC 5389).
  
  = Sounds freightning! May be we need to mandate encryption and
  hope that no 4-byte sequence matched the IP address? What do they
  do with encrypted packets? How do they know they're encrypted?
  
  One would assume these broken devices will potentially corrupt
  encrypted packets, the same as they will potentially corrupt any
  other packet. Hiding the source address when it appears in the
  payload (either by encryption, or using some trivial obfuscation as
  does STUN) simply reduces the probability of such corruption so it's
  no longer 100% guaranteed that the payload will be mangled.
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary

2008-12-16 Thread Sam Hartman
 John == John C Klensin john-i...@jck.com writes:

 We have a reality that the new IPR rules are fundamentally
 problematic.  Prior to their imposition, we had a functioning
 system.  Now we don't.
 
 And the only thing that changed was imposition of the new
 rules.  Nothing else happened.
 
 The proposals are mostly about adding another layer of 'fix' to
 what was supposed, itself, to be an incremental fix.  The odds
 that we will get that additional layer wrong are demonstrably
 high.

John And that is precisely why my I-D turns things into a choice
John between new rules and old rules, based only on the
John conclusion of the submitter about what is important... and
John why it does not attempt to fix 5378.  I agree with you
John about the odds of getting an additional layer right,
John especially so if we try to do it quickly.

For what it is worth, I as an individual support the new rules, and believe 
Russ gave me a fine answer.
I would not support turning this into a choice.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary

2008-12-16 Thread SM

At 13:41 16-12-2008, Sam Hartman wrote:
For what it is worth, I as an individual support the new rules, and 
believe Russ gave me a fine answer.


You asked a good question.


I would not support turning this into a choice.


According to a message [1] posted by the IETF Chair, the updated 
boilerplate is required as from December 16.  There was a Last Call 
on December 16 for draft-ietf-sieve-managesieve.  There is a 
sub-section in that I-D that is similar to text found in RFCs on the 
Standard Track.  Previously, reuse of text as part of the Standard 
Process wasn't an issue.  One could even argue that the reuse of some 
text falls under the doctrine of fair use.


If I were to send comments pointing out that some parts of the 
document are not in line with what RFC 5378 prescribes, the IESG may 
have to determine whether BCP 78 and BCP 79 were followed even if the 
IETF takes no position regarding the validity or scope of any 
Intellectual Property Rights or other rights.


1. http://www.ietf.org/mail-archive/web/ietf-announce/current/msg05509.html

Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPR Questions Raised by Sam Hartman at the IETF 73 Plenary

2008-12-16 Thread Joel M. Halpern
I have a very different view of this situation, and disagree wstrongly 
with John's recommended fix (or the equivalent fix of completely 
rolling back 5378 and 5377.)


First and foremost, it should be kept in ming by anyone reading this 
that the IPR working was convened by the then IETF chair, and continued 
by succeeding chairs because there were problems that actually needed to 
be fixed.  There are things that the community considered (and 
presumably still does consider) either necessary or important that are 
not properly addressed by the earlier documents.  This varied between a 
lack of clarity in some areas, and a lack of ability to perform 
necessary actions in other areas.
The working group was not convened just because we wanted to, or even 
because we thought we could make things better.  If it had not 
appeared that there were significant problems, I for one would have 
taken the much easier course and just said leave it alone.  And I am 
quite confident I am not alone.


Secondly, giving people a choice of terms is basically going to create 
confusion.  For example, one of the issues raised in the working group 
was that our previous rights grant appeared not to properly allow folks 
to modify code.  And it required them to include things in used code 
that made it hard to use that code in various contexts.  We want to see 
implementations.  We want to see accurate, interoperable 
implementations.  Using the code and tables from various RFC is 
somewhere between necessary and and desirable.
But, if we assume that the folks who were concerned were right, then if 
we give everyone a choice, anyone trying to right code using our tables, 
etc has to figure out what rights they are being granted to use any 
given RFC or I-D.
Yes, there are those who argued that there was no problem.  However, the 
WG concluded that there was at the very least significant confusion, and 
probably an actual problem.


Yes, having to get rights from folks is a pain.
But if we are not willing to push to do that, then we might as well 
consider that the rights granted to the IETF are locked in stone 
forever, and can never be upgraded, because it will never happen.


It should be understood also that some folks actually wanted us to go 
further than we did in 5377.  5378 and 5377 represent the best 
compromise we could work out.  The community is certainly free to decide 
that it doesn't want to do that.


While some folks who were there say that they feel not enough attention 
was paid to this issue, it is the case that we did discuss at least some 
of the impact, and none of what turned out to be needed surprised me.


Yours,
Joel M. Halpern
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-ietf-sieve-managesieve (A Protocol for Remotely Managing Sieve Scripts) to Proposed Standard

2008-12-16 Thread The IESG
The IESG has received a request from the Sieve Mail Filtering Language 
WG (sieve) to consider the following document:

- 'A Protocol for Remotely Managing Sieve Scripts '
   draft-ietf-sieve-managesieve-05.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2008-12-30. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-sieve-managesieve-05.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=17794rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce