Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Sam Hartman
 Russ == Russ Housley hous...@vigilsec.com writes:

Russ, I'm failing to understand how your comments are responsive to
the points I made.  One of the things I said is that I was not
specifically speaking to the questino of whether removing Dean from
the aliases was reasonable.  However your entire response focused on
Dean.  

My question is whether treating tools.ietf.org aliases as IETF lists
is reasonable policy.  Your response is all about whether it is
reasonable for Dean to post to these lists.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Andrew Sullivan
On Fri, Apr 17, 2009 at 04:18:06PM -0400, Sam Hartman wrote:

 My question is whether treating tools.ietf.org aliases as IETF lists
 is reasonable policy.

In my opinion, it is.

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Dave CROCKER



Andrew Sullivan wrote:

On Fri, Apr 17, 2009 at 04:18:06PM -0400, Sam Hartman wrote:


My question is whether treating tools.ietf.org aliases as IETF lists
is reasonable policy.


In my opinion, it is.



+1

d/
--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Russ Housley

Sam:

I am assuming that you are referencing this paragraph from you original note:

 In addition, the IETF policies on spam control clearly do not apply to
 closed lists.  Thes policies assume an archive that posters can check
 in order to see if their postings went through.  If you are going to
 apply spam policies to these aliases as if they are mailing lists,
 then please point me at the public archives you set up for these
 aliases so I can see if my postings make it.

I do not think we are talking about the spam policies.  We are 
talking about whether the PR-Action for these mail aliases is a 
suitable interpretation.


Russ



At 04:18 PM 4/17/2009, Sam Hartman wrote:

 Russ == Russ Housley hous...@vigilsec.com writes:

Russ, I'm failing to understand how your comments are responsive to
the points I made.  One of the things I said is that I was not
specifically speaking to the questino of whether removing Dean from
the aliases was reasonable.  However your entire response focused on
Dean.

My question is whether treating tools.ietf.org aliases as IETF lists
is reasonable policy.  Your response is all about whether it is
reasonable for Dean to post to these lists.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

2009-04-20 Thread Hui Deng
some level of generic network characteristics benefit for the user.
one example could be that routing metric may need to be updated
to align with various kind of access technologies.

-Hui

2009/4/17 Giyeong Son g...@rim.com:
 Again as I mentioned, in order to prepare or build an efficient routing
 policy and to select an efficient connection/interface, it would be
 necessary to identify, classify and/or prioritize underlying network
 characteristics or information of the attached networks.

 In addition, as many network characteristics which are essential to be
 used for simultaneous use of multiple interfaces are not generic forms
 (e.g. SSID only for 802.11), these network characteristics may require a
 mechanism to make them be associated with generic (formed) elements used
 for routing policy preparation and routing decision. Therefore, if MIF
 can provide an efficient guideline or mechanism for associating, it
 would be really amazing.

 I believe, the current IP network related protocols and standardized
 technologies may not be enough to support that on multiple interface
 network environment.

 I think each vendor, carrier, service provider and/or technology, which
 utilizes or supports simultaneous use of multiple
 connections/interfaces, may have their own proprietary mechanism in
 terms of gathering of network characteristics of each interface/access
 network technology (e.g. WiFi, GPRS, CDMA, Bluetooth, etc.), their
 mapping mechanism with generic formed elements, routing policy and
 decision mechanisms with different IP based service networks owned by
 different service providers or different IP network enabling core
 networks owned by different carriers.

 So, the problem Ted and Ralph are addressing seems to be just one of
 issues (but only for WiFi network environments) in terms of network
 characteristic that may be necessary to be considered during selection
 of an efficient connection/interface from multiple candidates.

 Giyeong

 -Original Message-
 From: Ralph Droms [mailto:rdr...@cisco.com]
 Sent: April 16, 2009 1:32 PM
 To: Ted Lemon
 Cc: Giyeong Son; Hui Deng; dhc WG; gen-...@ietf.org; mif; ietf@ietf.org;
 black_da...@emc.com
 Subject: Re: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

 Yup ... there is currently no way to provide authenticated, meaningful
 identification of the network(s) to which a host is attached.  Without
 that identification, it's pretty hard to write any reasonable policies.

 - Ralph

 On Apr 16, 2009, at 1:26 PM 4/16/09, Ted Lemon wrote:

 On 2009/4/13 Ralph Droms rdr...@cisco.com wrote:
 For example, would a host process
 information received from a Starbucks network over its 802.11
 interface differently from information received a home network over
 the 802.11 interface?

 It's even more fun than that.   How do we reliably know that we are
 at Starbucks, and not at home?   The SSID?   That's not an
 authenticated token.   Currently Windows makes security decisions
 based on the SSID.   You could call this the best answer they could
 come up with for a problem with no good answers.   Or you could say
 that it instills the user with a false sense of security.   Either
 way, it's not something I'd be comfortable seeing in a protocol spec,
 so if the client is in fact to make decisions as you've
 suggested, we'd need a secure way of doing this.   I don't know
 enough about WPA Enterprise to know if there's a bidirectional
 authentication going on there - from the UI perspective it looks like
 it's one-way.



 -
 This transmission (including any attachments) may contain confidential 
 information, privileged material (including material protected by the 
 solicitor-client or other applicable privileges), or constitute non-public 
 information. Any use of this information by anyone other than the intended 
 recipient is prohibited. If you have received this transmission in error, 
 please immediately reply to the sender and delete this information from your 
 system. Use, dissemination, distribution, or reproduction of this 
 transmission by unintended recipients is not authorized and may be unlawful.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: resignation business

2009-04-20 Thread Andrew Sullivan
On Mon, Apr 20, 2009 at 05:17:31PM +0200, Francis Dupont wrote:
 = this was and is the rule but because of typewriters the rule was
 suspended during the 20th century. Now typewriters are in museums
 and current century is 21th. BTW accents can be necessary to avoid
 some ambiguities (cf 2nd reference) so the rule (in this case :-) is
 justified.

Please, if people are going to open that debate again, could you (1)
only do it if you've read all the relevant material in the idnabis
archives and (2) do it on the WG mailing list (idnabis), since that's
where the relevant discussions are going on?

I will not rehash the arguements about this here, but I urge people
who want to weigh in on this to think about the matching rules for E
and e in the DNS, and then think about what might happen if we also
need to accommodate E-é _and_ É-é.  Thank you.

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-20 Thread Hui Deng
 And you talked about Stuart Cheshire described a couple of IETFs ago,
 Could you help to point out the link?

 Sadly, I don't have it, but I suspect Stuart does, and I'm pretty sure he's
 reading this.
Thanks, let's see whether he is going to talk here.

 The gist of what he was saying is that if you have an IPv4 address that
 looks okay, and an IPv6 address that looks okay, you can't assume that they
 *are* okay, because there may be no route to the global internet on either
 your IPv4 or your IPv6 link.   So you must attempt to use both addresses,
 not just one, and you must do it at the same time.   Whichever one answers
 first, you take.
It means that the new IP model will try host's multiple connections
each time as you suggested as well.

 If you prefer either IPv4 or IPv6, and the transport you preferred happens
 to be the one that was broken, a smart user will disable the one you've
 preferred.   That user will then advise his or her friends, for example,
 that IPv6 creates instability, so you should disable it.   This impedes
 deployment.

 The unattended multiple interface situation is quite similar.   I think the
 attended case (a laptop with two or more network interfaces) is actually
 better handled through user intervention, because the user has knowledge of
 the physical situation that would be difficult to communicate to the
 computer.   But in the unattended case, you can get into the same sort of
 wrong learning situation, where a smart but naive user who debugs a
 network problem winds up learning a workaround that would impede
 interoperability if everybody did it.
Interesting thoughing, workaround will impede deployment.

Thanks

-Hui
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [mif] WG Review: Multiple InterFaces (mif)

2009-04-20 Thread Giyeong Son
Hi all,

Jari seems to be using the term of connection in his emails as
association between an interface and an (access) network. When I used
connection so far during email exchanges, I have used it as more
likely routing or routable path for packet transmission in an abstract
manner. I feel that different usage of the same word connection may
consequence confusion or misinterpretation to the audiences.

Therefore, it might be better to clarify it in terms of MIF so that
everybody can be in the same page without any confusion or
misinterpretation:-)


Giyeong

 

-Original Message-
From: mif-boun...@ietf.org [mailto:mif-boun...@ietf.org] On Behalf Of
Jari Arkko
Sent: April 18, 2009 5:25 AM
To: IETF Discussion
Cc: Adrian Farrel; mif
Subject: Re: [mif] WG Review: Multiple InterFaces (mif)

I wanted to bring up a comment that was raised during the IESG and IAB
discussions about this charter by Adrian and others.

When the work started, it was clearly about multiple interfaces. Upon
closer inspection, we have realized that the overall problem is somewhat
larger. Problems that occur with multiple interfaces also occur even
with one interface, when you have a number of default routers on the
same link. The current charter text reflects this in some parts of the
text, e.g.,

 Many hosts have the ability to connect to multiple networks 
 simultaneously. This can happen over multiple physical network 
 interfaces, a combination of physical and virtual interfaces (VPNs or 
 tunnels), or even through multiple default routers being on the same 
 link.

However, it was pointed out that the text is not consistent. Other parts
still talk about multiple interfaces, e.g.,

 A number of operating systems have implemented various techniques to 
 deal with multiple interfaces. Some devices employ only one interface 
 at a time and some allow per-host configuration of preferences between

 the interfaces but still use just one at a time. Other systems allow 
 per-application preferences or implement sophisticated policy managers

 that can be configured by users or controlled externally.

 The purpose of the MIF working group is to describe the issues 
 surrounding the use of multiple interfaces on hosts, document existing

 practice, and make recommendations about best current practice.

This has created some confusion with regards to what really is in scope.

Are hosts with multiple physical interfaces in scope (obviously yes)? 
Are hosts with multiple virtual or physical interfaces in scope (yes)? 
Are hosts with one interface but multiple connections to different
networks in scope (I think they should be)? Are we only talking about
multiple interfaces or connections when they are to different
administrative domains (I do not think it really matters, even in one
domain the parameters can be different)?

I would like to solicit suggestions on how to modify the text to be
fully aligned. Note: we need to keep the name of the group the same, as
it something that is already familiar to people, not to mention the fact
that the IETF database system does not allow an acronym change very
easily.

Would it be enough to change s/multiple interfaces/connections to
multiple networks/ in the second quoted text excerpt?

Jari

___
mif mailing list
m...@ietf.org
https://www.ietf.org/mailman/listinfo/mif

-
This transmission (including any attachments) may contain confidential 
information, privileged material (including material protected by the 
solicitor-client or other applicable privileges), or constitute non-public 
information. Any use of this information by anyone other than the intended 
recipient is prohibited. If you have received this transmission in error, 
please immediately reply to the sender and delete this information from your 
system. Use, dissemination, distribution, or reproduction of this transmission 
by unintended recipients is not authorized and may be unlawful.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [mif] [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-20 Thread Giyeong Son
You are right money is more operation related not technical side. However, I 
believe that this is also one of the most important factors and popularly has 
been used for determining an interface with an (access) network among multiple 
active interfaces automatically and dynamically. And, the mechanism to adopt or 
apply like this network characteristic into the routing policy on the network 
environment of simultaneous use of multiple interfaces may be deeply related 
with technical side regarding simultaneous use of multiple interfaces though.  

For instance, for a dual-mode device at home with WiFi and IP over cellular 
available (e.g. CDMA, GPRS/EDGE, etc), combination of various network 
characteristics in it would be the major factors to determine either WiFi or 
cellular for packet transmission. My point here is how to present those factors 
into the routing policy in order to determine a suitable interface with the 
type of *DATA or PACKET* for the transmission would be one of  the important 
technical side to be discussed in terms of simultaneous use of multiple 
interfaces.

However, according to Hui, it seems to be out of MIF scope described in the 
charter. BTW, again regarding MIF scope, I am wondering if we have already gone 
through a scenario for simultaneous use of multiple active interfaces based on 
a network environment with necessary associated network entities (from enabling 
attachment of multiple access networks to processing a packet transmission over 
the access networks from the link layer up to the transport layer) in order to 
identify the MIF scope (presented in the charter). If it has been already done 
or everyone understands clearly in terms of the MIF scope, it is OK. Otherwise, 
it would be good to practice it in order to clarify the MIF scope in the 
charter. 


Giyeong

-Original Message-
From: Hui Deng [mailto:denghu...@gmail.com] 
Sent: April 19, 2009 11:40 AM
To: Giyeong Son
Cc: Ted Lemon; Ralph Droms; mif; ietf@ietf.org; gen-...@ietf.org; dhc WG; 
black_da...@emc.com; Bernie Volz
Subject: Re: [mif] [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

Hi, Giyeong,

At least those are not in the current charter scope.
but Ted gave a one potential solution on one problem.

Regarding to Money et al, I think IETF is not going to talk about it.
which is more operational recommendation. Operation could recommend the 
benchmark to let the user to select what he favoriate by human language other 
than technical language.

thanks

-HUi

2009/4/15 Giyeong Son g...@rim.com:
 I think Ted pointed out very interesting but crucial problems if I 
 understood correctly. So, I'd like to confirm what Ted indicated and
 emphasized:

 1. How to dynamically/automatically/efficiently enable and manage 
 multiple active interfaces on a host?
 2. How to utilize multiple active interfaces on a host?
 2. What are the efficient (or cost-effective) routing decision policy?
 Is it least cost routing policy? Or other? If it is least cost routing 
 policy, what are the costs? Are they money to use the connection (e.g.
 WiFi vs. cellular), time to spend for the transmission, reliability
 of the transmission, etc?

 If those are what Ted indicated, I am also interested in asking if the 
 above things are in scope of MIF. Based on my experience in terms of 
 simultaneous use of multiple interfaces, the aboves are the most 
 critical and interesting issues in practice in order to utilize the 
 network environment of simultaneous use of multiple interfaces 
 reliably and efficiently.


 Giyeong

 -Original Message-
 From: mif-boun...@ietf.org [mailto:mif-boun...@ietf.org] On Behalf Of 
 Ted Lemon
 Sent: April 14, 2009 5:48 PM
 To: Ralph Droms
 Cc: mif; ietf@ietf.org; black_da...@emc.com; dhc WG; gen-...@ietf.org; 
 Bernie Volz
 Subject: Re: [mif] [dhcwg] Gen-ART review of 
 draft-ietf-dhc-container-00

 On Apr 14, 2009, at 3:31 AM, Ralph Droms wrote:

 Now, I admit I'm describing a hypothetical and abstract scenario.  I 
 don't have a specific example of a situation in which a host might 
 make decisions - either in the stack or in an application or ??? - 
 about outbound traffic based on knowledge of how that traffic would 
 be

 forwarded by the RG.

 That's right.   But I think it's not an accident that this is a 
 hypothetical scenario.   In reality, a scenario like this has been 
 likely ever since wireless and wired network interfaces became 
 standard on laptops.   And yet we don't have any real-life examples of 
 problems that this has caused, which need solving.   To me, that seems 
 like an indication that this is not a real operational problem.   That 
 is, that the answer if two DHCP servers send the same client 
 conflicting information on two different interfaces, that is a 
 misconfiguration, and should be solved by correcting the 
 misconfiguration is, in practice, the correct answer.

 If it were not, we would be hearing about concrete, real-world 
 scenarios of the 

Re: The ietf-honest nonsense is back

2009-04-20 Thread Rich Kulawiec

I've found it quite useful to block all traffic from persistent
spammers' network domains/network blocks.  There's really no need
for anyone, regardless of affiliation or role, to endure abuse
of this nature.  The originators of that abuse are disposable,
and should be treated as such.

---Rsk
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-20 Thread Ted Lemon

On Apr 19, 2009, at 7:46 AM, Hui Deng wrote:

And you talked about Stuart Cheshire described a couple of IETFs ago,
Could you help to point out the link?


Sadly, I don't have it, but I suspect Stuart does, and I'm pretty sure  
he's reading this.


The gist of what he was saying is that if you have an IPv4 address  
that looks okay, and an IPv6 address that looks okay, you can't assume  
that they *are* okay, because there may be no route to the global  
internet on either your IPv4 or your IPv6 link.   So you must attempt  
to use both addresses, not just one, and you must do it at the same  
time.   Whichever one answers first, you take.


If you prefer either IPv4 or IPv6, and the transport you preferred  
happens to be the one that was broken, a smart user will disable the  
one you've preferred.   That user will then advise his or her friends,  
for example, that IPv6 creates instability, so you should disable  
it.   This impedes deployment.


The unattended multiple interface situation is quite similar.   I  
think the attended case (a laptop with two or more network interfaces)  
is actually better handled through user intervention, because the user  
has knowledge of the physical situation that would be difficult to  
communicate to the computer.   But in the unattended case, you can get  
into the same sort of wrong learning situation, where a smart but  
naive user who debugs a network problem winds up learning a workaround  
that would impede interoperability if everybody did it.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] WG Review: Multiple InterFaces (mif)

2009-04-20 Thread Jari Arkko

Giyeong Son wrote:

Hi all,

Jari seems to be using the term of connection in his emails as
association between an interface and an (access) network. When I used
connection so far during email exchanges, I have used it as more
likely routing or routable path for packet transmission in an abstract
manner. I feel that different usage of the same word connection may
consequence confusion or misinterpretation to the audiences.

Therefore, it might be better to clarify it in terms of MIF so that
everybody can be in the same page without any confusion or
misinterpretation:-)
  


Yes -- this is indeed an issue. Let me see what I can come up with.

Jari

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Russ Housley

Dean:


The official nomcom addresses are at tools.ietf.org


Not so.  The current NomCom can be reached at nomco...@ietf.org.  It 
does appear that Joel mistakenly sent some mail from an address at 
tools.ietf.org, but one that I got said:


| Please return to nomco...@ietf.org no later than
| Oct 3, 2008.


Russ


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Multiple InterFaces (mif)

2009-04-20 Thread Jari Arkko

Hui,

I'm not sure if I understood your comment about the WG name correctly. 
We cannot change it at this stage easily. So lets just keep it as is.


Please find below the full charter proposal, with the suggested changes 
folded in from you and others.


Jari

Multiple InterFaces (mif)

Last Modified: 2009-04-20

Current Status: Proposed Working Group

Chair(s):
TBD

Internet Area Director(s):
Ralph Droms rdr...@cisco.com
Jari Arkko jari.ar...@piuha.net

Internet Area Advisor:
TBD

Mailing Lists:
General Discussion: m...@ietf.org
To Subscribe: https://www.ietf.org/mailman/listinfo/mif
Archive: http://www.ietf.org/mail-archive/web/mif

Description of Working Group:

Many hosts have the ability to attach to multiple networks 
simultaneously. This can happen over multiple physical network 
interfaces, a combination of physical and virtual interfaces (VPNs or 
tunnels), or even through multiple default routers being on the same 
link. For instance, current laptops and smartphones typically have 
multiple access network interfaces.


A host attached to multiple networks has to make decisions about default 
router selection, address selection, DNS server selection, choice of 
interface for packet transmission, and the treatment of configuration 
information received from the various networks. Some configuration 
objects are global to the node, some are local to the interface, and 
some are related to a particular prefix. Various issues arise when 
multiple configuration objects that are global to the node are received 
on different interfaces. At best, decisions about these matters have an 
efficiency effect. At worst, they have more significant effects such as 
security impacts, or even lead to communication not being possible at all.


A number of operating systems have implemented various techniques to 
deal with attachments to multiple networks. Some devices employ only one 
interface at a time and some allow per-host configuration of preferences 
between the interfaces but still use just one at a time. Other systems 
allow per-application preferences or implement sophisticated policy 
managers that can be configured by users or controlled externally.


The purpose of the MIF working group is to describe the issues of 
attaching to multiple networks on hosts, document existing practice, and 
make recommendations about best current practice. The WG shall employ 
and refer to existing IETF work in this area, including, for instance, 
strong/weak models (RFC 1122), address selection (RFC 3484), DHCP 
mechanisms, Router Advertisement mechanisms, and DNS recommendations. 
The focus of the working group should be on documenting the system level 
effects to host IP stacks and identification of gaps between the 
existing IETF recommendations and existing practice. The working group 
shall address both IPv4 and IPv6 as well as stateless and stateful 
configuration.


Network discovery and selection on lower layers as defined by RFC 5113 
is out of scope. Also, the group shall not develop new protocol or 
policy mechanisms; recommendations and gap analysis from the group are 
solely based on existing solutions. The group shall not assume any
software beyond basic IP protocol support on its peers or in network 
nodes. No work will be done to enable traffic flows to move from one 
interface to another. The group recognizes existing work on mechanisms 
that require peer or network support for moving traffic flows such as 
RFC 5206, RFC 4980 and the use of multiple care-of addresses in Mobile 
IPv6. This group does not work on or impact such mechanisms.


Once the group has completed its work items, the IETF can make an 
informed decision about rechartering the working group to define new 
mechanisms or asking other, specialized working groups (such as DHC or 
6MAN) to deal with specific issues.


Milestones:

May 2009 WG chartered
July 2009 Initial draft on problem statement adopted by the WG
September 2009 Initial draft on existing practices adopted by the WG
Jan 2010 Initial best current practices draft adopted by the WG
March 2010 Problem statement draft submitted to the IESG for publication 
as an Informational RFC
July 2010 Existing practices draft submitted to the IESG for publication 
as an Informational RFC
September 2010 Best current practices draft submitted to the IESG for 
publication as a BCP

October 2010 Recharter or close

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Multiple InterFaces (mif)

2009-04-20 Thread Ted Hardie
At 1:14 PM -0700 4/20/09, Jari Arkko wrote:
Hui,

I'm not sure if I understood your comment about the WG name correctly.
We cannot change it at this stage easily. So lets just keep it as is.

Huh?  Why on earth is it hard?  Strings are cheap.

Not that I care much about this, but having been in many a working
group name change (hi, DRINKS folks!), I don't know what has changed
to make this hard. 

Ted



Please find below the full charter proposal, with the suggested changes
folded in from you and others.

Jari

Multiple InterFaces (mif)

Last Modified: 2009-04-20

Current Status: Proposed Working Group

Chair(s):
TBD

Internet Area Director(s):
Ralph Droms rdr...@cisco.com
Jari Arkko jari.ar...@piuha.net

Internet Area Advisor:
TBD

Mailing Lists:
General Discussion: m...@ietf.org
To Subscribe: https://www.ietf.org/mailman/listinfo/mif
Archive: http://www.ietf.org/mail-archive/web/mif

Description of Working Group:

Many hosts have the ability to attach to multiple networks
simultaneously. This can happen over multiple physical network
interfaces, a combination of physical and virtual interfaces (VPNs or
tunnels), or even through multiple default routers being on the same
link. For instance, current laptops and smartphones typically have
multiple access network interfaces.

A host attached to multiple networks has to make decisions about default
router selection, address selection, DNS server selection, choice of
interface for packet transmission, and the treatment of configuration
information received from the various networks. Some configuration
objects are global to the node, some are local to the interface, and
some are related to a particular prefix. Various issues arise when
multiple configuration objects that are global to the node are received
on different interfaces. At best, decisions about these matters have an
efficiency effect. At worst, they have more significant effects such as
security impacts, or even lead to communication not being possible at all.

A number of operating systems have implemented various techniques to
deal with attachments to multiple networks. Some devices employ only one
interface at a time and some allow per-host configuration of preferences
between the interfaces but still use just one at a time. Other systems
allow per-application preferences or implement sophisticated policy
managers that can be configured by users or controlled externally.

The purpose of the MIF working group is to describe the issues of
attaching to multiple networks on hosts, document existing practice, and
make recommendations about best current practice. The WG shall employ
and refer to existing IETF work in this area, including, for instance,
strong/weak models (RFC 1122), address selection (RFC 3484), DHCP
mechanisms, Router Advertisement mechanisms, and DNS recommendations.
The focus of the working group should be on documenting the system level
effects to host IP stacks and identification of gaps between the
existing IETF recommendations and existing practice. The working group
shall address both IPv4 and IPv6 as well as stateless and stateful
configuration.

Network discovery and selection on lower layers as defined by RFC 5113
is out of scope. Also, the group shall not develop new protocol or
policy mechanisms; recommendations and gap analysis from the group are
solely based on existing solutions. The group shall not assume any
software beyond basic IP protocol support on its peers or in network
nodes. No work will be done to enable traffic flows to move from one
interface to another. The group recognizes existing work on mechanisms
that require peer or network support for moving traffic flows such as
RFC 5206, RFC 4980 and the use of multiple care-of addresses in Mobile
IPv6. This group does not work on or impact such mechanisms.

Once the group has completed its work items, the IETF can make an
informed decision about rechartering the working group to define new
mechanisms or asking other, specialized working groups (such as DHC or
6MAN) to deal with specific issues.

Milestones:

May 2009 WG chartered
July 2009 Initial draft on problem statement adopted by the WG
September 2009 Initial draft on existing practices adopted by the WG
Jan 2010 Initial best current practices draft adopted by the WG
March 2010 Problem statement draft submitted to the IESG for publication
as an Informational RFC
July 2010 Existing practices draft submitted to the IESG for publication
as an Informational RFC
September 2010 Best current practices draft submitted to the IESG for
publication as a BCP
October 2010 Recharter or close

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Multiple InterFaces (mif)

2009-04-20 Thread Jari Arkko

Ted,


Huh?  Why on earth is it hard?  Strings are cheap.
  


On some previous WG creation exercise I was told that once the WG 
creation process is in the IETF's database system, the WG acronym cannot 
be changed, you can delete it and create a new one, but you cannot the 
acronym. Of course, I could create a new one and ask it to be brought to 
the right state... hopefully without having to re-do any real-life 
steps, like announcements going out or the topic being on the IESG 
telechat. This might work, but I'd have to investigate further to ensure 
that it actually is possible. If it was the only problem I would.


The other problem is that people may already recognize the name. And I 
don't have a nice replacement acronym in mind. Multple Interfaces is a 
very concrete description of the problem, even if its not the most 
generic one. Multiple Attachments to Networks (MAN, but too close to 
6MAN), Connections to Multiple Networks (CMN, a bit boring), etc. But 
its too late in the day here to be creative. I'm sure someone sends the 
coolest acronym in reply :-)


Bottom line: not impossible, but requires some effort.

Jari

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Multiple InterFaces (mif)

2009-04-20 Thread Keith Moore
It seems to me that the general problem is not multiple interfaces, but
multiple addresses per host.  It doesn't matter (much) whether those
addresses result from multiple physical interfaces, a combination of
physical and virtual network interfaces, multiple prefixes being
advertised on the network attached to any particular interface, or even
a mixture of v4 and v6.

So that might have some impact on the name, particularly if you want to
attract the breadth of interests whom this affects.  Something like
Hosts Addressed Multiply (HAM), perhaps?

Keith

p.s. and if the software can't deal with changing a wg name before it's
chartered, seems like that should result in a change request for the
software.  we really want to resist having our tools make the rules by
which we operate, rather than the other way around.


 Ted,
 
 Huh?  Why on earth is it hard?  Strings are cheap.
   
 
 On some previous WG creation exercise I was told that once the WG
 creation process is in the IETF's database system, the WG acronym cannot
 be changed, you can delete it and create a new one, but you cannot the
 acronym. Of course, I could create a new one and ask it to be brought to
 the right state... hopefully without having to re-do any real-life
 steps, like announcements going out or the topic being on the IESG
 telechat. This might work, but I'd have to investigate further to ensure
 that it actually is possible. If it was the only problem I would.
 
 The other problem is that people may already recognize the name. And I
 don't have a nice replacement acronym in mind. Multple Interfaces is a
 very concrete description of the problem, even if its not the most
 generic one. Multiple Attachments to Networks (MAN, but too close to
 6MAN), Connections to Multiple Networks (CMN, a bit boring), etc. But
 its too late in the day here to be creative. I'm sure someone sends the
 coolest acronym in reply :-)
 
 Bottom line: not impossible, but requires some effort.
 
 Jari
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Multiple InterFaces (mif)

2009-04-20 Thread George Tsirtsis
Keith,

I think this (multiple IP addresses) is one issue this WG seems to
want to deal with.
Another one is the availability of multiple paths (next hop routers)
for a given destination.

It seems indeed that whether the source addresses, and even the
paths/routes, are over different physical interfaces or not, is
somewhat secondary.

There is, however, significance in the presence of different
interfaces in a given non-router node...I do not think either of the
other two points (multiple IFs, multiple routes) should be lost
completely in the effort to widen/clarify the charter.

George
P.S.: It would be kind of funny to figure out that this WG really has
nothing to do with Multiple IFs, and yet maintain the MIF name... it
would enhance the already obscure tradition of nonsensical terms like
BOFs, RFCs etc ..not to mention other rather funny WG names :-)

On Mon, Apr 20, 2009 at 10:11 PM, Keith Moore
mo...@network-heretics.com wrote:
 It seems to me that the general problem is not multiple interfaces, but
 multiple addresses per host.  It doesn't matter (much) whether those
 addresses result from multiple physical interfaces, a combination of
 physical and virtual network interfaces, multiple prefixes being
 advertised on the network attached to any particular interface, or even
 a mixture of v4 and v6.

 So that might have some impact on the name, particularly if you want to
 attract the breadth of interests whom this affects.  Something like
 Hosts Addressed Multiply (HAM), perhaps?

 Keith

 p.s. and if the software can't deal with changing a wg name before it's
 chartered, seems like that should result in a change request for the
 software.  we really want to resist having our tools make the rules by
 which we operate, rather than the other way around.


 Ted,

 Huh?  Why on earth is it hard?  Strings are cheap.


 On some previous WG creation exercise I was told that once the WG
 creation process is in the IETF's database system, the WG acronym cannot
 be changed, you can delete it and create a new one, but you cannot the
 acronym. Of course, I could create a new one and ask it to be brought to
 the right state... hopefully without having to re-do any real-life
 steps, like announcements going out or the topic being on the IESG
 telechat. This might work, but I'd have to investigate further to ensure
 that it actually is possible. If it was the only problem I would.

 The other problem is that people may already recognize the name. And I
 don't have a nice replacement acronym in mind. Multple Interfaces is a
 very concrete description of the problem, even if its not the most
 generic one. Multiple Attachments to Networks (MAN, but too close to
 6MAN), Connections to Multiple Networks (CMN, a bit boring), etc. But
 its too late in the day here to be creative. I'm sure someone sends the
 coolest acronym in reply :-)

 Bottom line: not impossible, but requires some effort.

 Jari

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Fred Baker

More to the point, the guideline in RFC 3683 is:

   A PR-action identifies one or more individuals, citing messages
   posted by those individuals to an IETF mailing list, that appear to
   be abusive of the consensus-driven process.  If approved by the  
IESG,

   then:

   o  those identified on the PR-action have their posting rights to
  that IETF mailing list removed; and,

   o  maintainers of any IETF mailing list may, at their discretion,
  also remove posting rights to that IETF mailing list.

Henk is applying the second bullet of the guideline and is, per the  
RFC, within his rights in doing so.


With respect to rai-...@tools and similar lists, I can see it two  
ways. I should imagine that Dean could send mail directly to Cull at  
his Cisco email address, where only Cisco's and Cullen's filters are  
relevant, so there is not an argument that Dean really needs access  
to rai-ads@. But unless Cullen sees an issue with posting to that  
list, it also doesn't solve a problem that anyone has (unless Henk has  
a problem as administrator). I see the second bullet as addressing the  
case where someone is a pain on some list such as the IDN list and  
migrates the problem to another list; if he has been banned from one,  
the administrator of the second has everything he needs to make that  
change. But that doesn't really apply in this case.


So I would ask what problem blocking access to lists at tools.ietf.org  
is solving, and if there is none, would argue in favor of a principle  
of least mechanism; there is no value in making someone go away from  
a place that he is not.


My two yen.

On Apr 17, 2009, at 8:32 AM, Samuel Weiler wrote:


On Fri, 17 Apr 2009, Cullen Jennings wrote:

I really don't understand why Dean should be blocked from rai-...@tools.ietf.org 
.


Dean is the subject of a PR Action; Henrik needs no other reason to  
apply the blocking and, if there is a reason or triggering event  
(which seems likely), he needn't disclose it to Dean or to this list.


In the general case, I also see no harm in the blocking: those  
aliases are for convenience, and it's easy to expand them using  
public sources.  Blocking their use doesn't meaingfully hamper IETF  
participation.


-- Sam
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Brian E Carpenter
On 2009-04-21 02:44, Dave CROCKER wrote:
 
 
 Andrew Sullivan wrote:
 On Fri, Apr 17, 2009 at 04:18:06PM -0400, Sam Hartman wrote:

 My question is whether treating tools.ietf.org aliases as IETF lists
 is reasonable policy.

 In my opinion, it is.
 
 
 +1

But the question is not whether they are IETF lists. It's whether they
are official in the sense that IETF office-holders (such as WG chairs,
ADs and IAB members) are obliged to read what is sent to them, in
order to exercise their duties under our process BCPs.

I don't believe they are official in that sense. From which I
conclude that it's reasonable to extend any PR-action to cover them.

   Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Fred Baker


On Apr 17, 2009, at 1:18 PM, Sam Hartman wrote:


My question is whether treating tools.ietf.org aliases as IETF lists
is reasonable policy.


And I would say that yes, they are IETF lists. For example, the  
tracker sends email through them. They are used by IETFers (well, by  
me at least) to get stuff to the right people without having to sort  
out who is the right AD/WG Chair/Author for a given email.


They sprang into being out of Henk's forehead, as opposed to being  
lifted out of the sea foam of IETF discussion. But they serve a useful  
IETF purpose and are built into many of the IETF tools.


If you are asking whether the policy SHOULD apply to them, that's  
another discussion. But as to whether they are IETF lists, if they are  
not, then to what do they belong?

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Andrew Sullivan
On Mon, Apr 20, 2009 at 02:29:58PM -0700, Fred Baker wrote:
 So I would ask what problem blocking access to lists at tools.ietf.org  
 is solving

Well, one obvious one is that some chairs, c., might have tricky
rules for capturing mail that actually pertains to the matters in
which they must listen to every crank on the planet due to process
rules, vs. other mail from the self-same cranks which can be
cheerfully discarded.  The role addresses represent a completely
separate path that needs to be tested, and so I can imagine such
chairs and so on asking, one at a time, for the filters to be
installed in this or that way.  This uses Henrik's valuable time.  It
seems to me like a problem worth solving.

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Extending the Dean Anderson PR-action to lists on tools.ietf.org

2009-04-20 Thread Sam Hartman

I want to stress that I'm not making any of the following arguments:

* Dean should be permitted to post to tools.ietf.org addresses--I don't care
* We should not ban people who have PR actions against them from tools.ietf.org 
- after consideration, I think banning specific people who have PR actions 
against them from posting to tools.ietf.org is fine
* The person running tools.ietf.org should not do something about abuse - 
absent any specific policy I think they should exercise good judgment


 Brian == Brian E Carpenter brian.e.carpen...@gmail.com writes:

Brian On 2009-04-21 02:44, Dave CROCKER wrote:
 
 
 Andrew Sullivan wrote:
 On Fri, Apr 17, 2009 at 04:18:06PM -0400, Sam Hartman wrote:

 My question is whether treating tools.ietf.org aliases as IETF
 lists
 is reasonable policy.
 
 In my opinion, it is.
 
 
 +1

Brian But the question is not whether they are IETF lists. It's
Brian whether they are official in the sense that IETF
Brian office-holders (such as WG chairs, ADs and IAB members) are
Brian obliged to read what is sent to them, in order to exercise
Brian their duties under our process BCPs.

I think that's one of two questions.  I believe that most of the
review directorates assumes that sending mail to *-chairs or
draf...@tools.ietf.org is an entirely appropriate way to send review
comments.  I'd be really incredibly put out if a wg ignored my review
comments because I sent to a tools.ietf.org address rather than the
draft authors.  Similarly, I'd be incredibly annoyed if I sent a bof
proposal to int-...@tools.ietf.org and it was bitbucketed because of
my choice of address.

I have high confidence that

1) Chairs, ADs and draft authors should not treat legitimate mail to 
tools.ietf.org differently than mail to the individual email address.

2) Restricting someone's access to tools.ietf.org significantly
impacts their ability to participate in certain ietf processes,
including cross-area reviews, etc.  It does not make it impossible;
it requires them to do more work than someone who is not restricted.


3) It is possible to abuse the tools.ietf.org mailing lists.  Doing so should 
be dealt with.

4) It is possible to abuse an individual's mail address.  Doing so should be 
dealt with.

5) There are situations where it would be reasonable for an AD, chair,
or author to block mail they were receiving at their individual
address to deal with spam, abuse, etc.

So, in some sense I do think that the tools aliases have some official
status in that they significantly facilitate review within our
processes.  I think it would be a big problem if they were unreliable,
if we granted access to them unfairly, etc.  I also think it would be
a big problem if they were abused in a manner where people started
discarding legitimate traffic.

I think that our spam-/list policies are a bad fit for the tools
lists.  The spam/list policies are designed to provide spam control
and abuse handling for relatively large discussion groups.  Having the
archive remain useful is important to our lists, but not to the tools
lists.  Similarly, the availability of a public archive allows someone
to see if their postings are making it through.

In contrast each tools alias reaches a fairly small number of people.
Certain network effects--for example the tendency of a flamewar to
break out because of the actions of a small number of recipients are
less likely.  For example, I don't think it would make sense to
suspend someone from posting for a few days until they cool down from
the tools aliases although this has often been done with WG lists.

I think that the boundaries for taking action are likely different for
the tools aliases than for lists.  In many cases individual mail
filters will be better tools to apply than anything global.

In conclusion, I do agree that abuse management for tools.ietf.org is
necessary.  I simply don't believe that assuming all our list/spam
policies apply makes sense.  I think that considering those policies
and especially the principles behind them (good luck figuring out what
those are) would be a good idea.  I also don't think we need to spend
a bunch of time defining policies; until the tools maintainers do
something we disagree with, I see no need to spend a lot of time on
it.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf