Re: motivations (was: Re: draft-housley-two-maturity-levels-00)

2010-06-23 Thread Eliot Lear
 Hi Ran, and thanks for your reply.

There are two separate issues that we need to distill.  First, what to
do about draft-housley-two-maturity-levels-00, and second, how do take
input to improve the overall process?

I have not really come down on one side or the other on this draft
(yet).  To be sure, two maturity levels seem better than three, and as
you know, I've proposed a single maturity level in the past, so to me,
the draft goes in the right direction.  However, I do not know how many
times we get to change this sort of procedure, and I believe the
community and IESG choice could be better informed than it is today. 
Having been involved in NEWTRK, and having produced what I think was the
only output from that group, in terms of RFCs or processes, I think I
know about which I write, when I say this community can become a bit of
an echo chamber, and could use a bit of formal academic input. 
Conveniently, there are researchers in this area.  This is an even
stronger reason for for me to not state an opinion about whether to
advance the draft.

As to the questions I asked, you and I obviously hold very different
views.  In the end, it is of course for researchers (who are the real
target of my questions) to ask what questions that they think might be
telling about our process.  I hope this discussion informs them, if and
when they review it.

You claim I have a vendor bias.  Guilty, but I am also concerned that we
do the right things for the right reasons, and that motivations are
reasonably aligned so that we have some reason to believe that what is
proposed will work and not have perverse impact.  Absent some serious
analysis, we also are making the assumption that the logic of decisions
of over twenty years ago holds today, when in fact we don't really even
know if it held then.

And now as to your specifics, you have placed a lot of weight on one
example, seemingly extrapolating from it, the Joint Interoperability
Test Command.  I have no experience working with them, and defer to
yours.  However, when you say,

   As examples, the JITC and TIC requirements pay a great
   deal of attention to whether some technology is past PS.
   Various IPv6 Profile documents around the world also pay
   much attention to whether a particular specification is
   past PS.

It leads to the following questions:

* Would the vendors have implemented the functionality ANYWAY? 
  Specifically, would other RFPs have already driven vendors in this
  direction?  Can you cite a counter example, where that was not the
  case?
* Is the defense industry at all representative of the broader
  market?  My own experience leads to an answer of, “barely at all”,
  and this has been assuredly the case with the Internet where a
  huge portion has run on on PS, Internet-Drafts, and proprietary
  standards, and not waited for advancement.  Examples have included
  BGP, MPLS-VPNs, HTTP, SSL, and Netflow, just to name a few. 

But again, I would like to see a rigorous analysis, rather than simply
rely on either of our personal experiences.

 The IETF already has a tendency to be very vendor-focused 
 vendor-driven.  It is best, however, if the IETF keeps the 
 interests of both communities balanced (rather than tilting 
 towards commercial vendors).
While this is a perhaps laudable idea, someone has to do the work to get
specifications to the next standards level.  The whole point of my
questions is to determine what motivations that someone might have for
actually performing that work.

 If we look at the 1694
 Proposed Standards, are we seeing a lack of implementation due to lack
 of stability?  I would claim that there are quite a number of examples
 to the contrary (but see below).
 Wrong question.  How clever to knock down the wrong strawman.

There's no need to be rude or snarky with me, even if you disagree.  You
are looking at this from the angle of the customers, and that's
perfectly reasonable.  I'm looking at it from the developers' point of
view, and from the supply side of your equation.  Both seem reasonably
valid, and so I have no qualms with the question part of your (A),
although as I mentioned above, I question your answer.

   B) whether that signal has a feedback loop to implementers/
  vendors that still works.
   The answer to this is also clearly YES.  Technologies that
   appear in RFPs or Tender Requirements have a stronger
   business case for vendors/implementers, hence are more
   likely to be widely implemented.

Certainly so, but I don't understand how you made the leap of logic from
your question to your answer.  Do we have situations, for instance,
where a proposed standard is compared to a draft standard, or a draft
standard is compared to a full standard, and one is chosen over the
other?  If so, are they the norm, and are they likely to drive
implementation?  Also, if all this gets you is interoperability, but

Re: The IPv6 Transitional Preference Problem

2010-06-23 Thread Martin Rex
David Conrad wrote:
 
 On Jun 18, 2010, at 7:21 PM, Martin Rex wrote:
  
  What you described is a client with a pretty selfish attitude
  that doesn't care about network, servers and the other clients
  put into code.
 
 Well, no.  What I described was my understanding of a proposal to
 facilitate transition that comes with some benefits and some costs.
 If nothing else, given the truly inspirational amount of crap on the
 Internet, I find it a bit difficult to get worked up about a few
 additional packets at communication initiation that are actually beneficial.

What you described results in a negative incentive for servers to
become accessible under IPv6 as an alternative to IPv4.  That is a real
problem.  If a large number of clients would follow your proposed
strategy, ever server that announces an IPv6 address gets hit by
twice the amount of connection requests, half of them being killed
prenatal or during infancy.

If IPv6 connectivity is still bad, then the connection request will
not reach the server and the server will not notice.  But it is a clear
goal to considerably improve on IPv6 connectivity in near term.
So the problem this selfish client-side hack addresses is going to
become worse for the servers over time.

I wonder at what point clients with a selfish attitude will stop
optimizing for their own interest alone.  The largest effort for
client apps is to implement the parallel connection handling at
all.  Using it for parallel IPv4 connects and not only IPv4+IPv6
comes essentially for free.  For typical HTTP-style protocols
with small app-requests, sending the client requests in paralell
would also be cheap for the client.  Deciding which connection
to retain based on which one yields the fastest server reply
is going to improve the user experience even more.  But the
more it seems to improve for the client, the worse it gets
for the server, the network and all the other clients.


 
  The concept works only as long as very few individuals try to
  get an unfair advantage over the rest.  But it definitely is
  doomed if EVERYONE, or even a larger number of people would
  practice this.
 
 We seem to be talking about different things.

At the abstract level, it is exactly the same thing.


When a project is falling behind schedule there are two things
that the responsible manager could do:

 - ask for more frequent status reports
 - ask the team what he could do to help them getting it done

One of them is inconsiderate, ineffective and popular.


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: I-D Action:draft-housley-two-maturity-levels-01.txt

2010-06-23 Thread Brian E Carpenter
It's been amusing to see the same old arguments going past for the
Nth time. Maybe we can have a side-thread about the value of N.

That said, my comment on this proposal is: ship it.

It's simple, simple to implement, and it aligns RFC 2026 with current practice.
So let's just do it.

Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-00

2010-06-23 Thread Jari Arkko

John,


That's news to me: I can't recall any recent discusses calling for
operational experience before publishing as Proposed Standard.

Some years ago, there was such a requirement for Routing Area, but
that was declared obsolete. (In actuality, there seems to still be a
somewhat informal requirement to document implementations for _some_
Routing Area documents, but it is not by IESG direction.)
  


AFAICT the IESG is not setting any requirements like this. We are 
careful about documents stating correctly what their limitations or not 
so well understood areas are. And sometimes a working group may decide 
that they do not want to forward a document for publication until it has 
some operational experience. But as a general rule the IESG is not 
demanding this.


I don't want to say that we would never do it for any document, however. 
I remember a recent case were one AD wanted operational experience on a 
new, relatively complex design. Other ADs pushed back and the document 
was approved without that experience. However, there might be cases 
where we should have that experience. One case that comes to mind is 
draft-ietf-intarea-ipv4-unique-id which among other things does an 
Update: 791 and we would never do that without years of very widespread 
experience.


In short: its a judgment call but generally speaking the IESG does not 
require operational experience for PS.


Jari

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: The IPv6 Transitional Preference Problem

2010-06-23 Thread Joel Jaeggli


Joel's iPad

On Jun 23, 2010, at 6:06 AM, Martin Rex m...@sap.com wrote:

 David Conrad wrote:
 
 On Jun 18, 2010, at 7:21 PM, Martin Rex wrote:
 
 What you described is a client with a pretty selfish attitude
 that doesn't care about network, servers and the other clients
 put into code.
 
 Well, no.  What I described was my understanding of a proposal to
 facilitate transition that comes with some benefits and some costs.
 If nothing else, given the truly inspirational amount of crap on the
 Internet, I find it a bit difficult to get worked up about a few
 additional packets at communication initiation that are actually beneficial.
 
 What you described results in a negative incentive for servers to
 become accessible under IPv6 as an alternative to IPv4.  That is a real
 problem.  If a large number of clients would follow your proposed
 strategy, ever server that announces an IPv6 address gets hit by
 twice the amount of connection requests, half of them being killed
 prenatal or during infancy.

We have tcp syn cookies actually to protect against the impact of state 
generation on connect. As long as you as a client reply only to one syn/ack, 
everything is cool.

 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: The IPv6 Transitional Preference Problem

2010-06-23 Thread Martin Rex
Joel Jaeggli wrote:
 
 On Jun 23, 2010, at 6:06 AM, Martin Rex m...@sap.com wrote:
  
  What you described results in a negative incentive for servers to
  become accessible under IPv6 as an alternative to IPv4.  That is a real
  problem.  If a large number of clients would follow your proposed
  strategy, ever server that announces an IPv6 address gets hit by
  twice the amount of connection requests, half of them being killed
  prenatal or during infancy.
 
 We have tcp syn cookies actually to protect against the impact of
 state generation on connect. As long as you as a client reply only
 to one syn/ack, everything is cool.

If it was the TCP stack that generated both original SYNs to decide
then this might work.  But it is some app code several layers higher
with a non-negligible latency.  Originally, there were two choices
for the app: multi-threaded blocking connect()s or asynchronous
non-blocking.  In the blocking variant, it becomes pretty difficult
to prevent TCP from completing the handshake.

If the IETF really thinks that there is value in going down that path,
then it should define parallel IPv4IPv6 connects at the network level,
so that either connection knows about the other one.  This should
be accompanied by a hint in DNS indicating that a node (a) technically
supports and (b) does not mind parallel connect()s.  When it is part
of the network stack, it could work with any existing app.


My knowledge about the TCP, IP and NAT stuff is pretty limitited.
While the TCP SYN cookies might help to protect the server apps,
how much resources do a single SYN/ACK use at the kernel/TCP stack
layer and how much resources do they use on the NATs in between?
Without FIN/ACK or RST only the closing client knows that the
resource can be freed.


-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Patrik Fältström
On 23 jun 2010, at 00.59, Thomson, Martin wrote:

 It seems that Section 7 has an old example in it.  Did you previously use 
 NAPTR with a D flag?

Actually, no. If you do know what protocol you look for, you can use the URI RR 
directly. The idea with the NAPTR and the D flag was that it would list what 
URI records exists in the zone.

Let me expand a bit also including the caldav example:

$ORIGIN example.com.

 IN NAPTR 200 10 D EM:protA  (  ; service
  ; regexp
 example.com.  )  ; replacement

 IN NAPTR 200 10 D caldav:caldav  (  ; service
  ; regexp
 example.com.  )  ; replacement

 IN NAPTR 200 10 D caldav:carddav  (  ; service
  ; regexp
 example.com.  )  ; replacement

_protA._EM IN URI prota://somehost.example.com/

_carddav._caldav IN URI http://somehost.example.com/whateveruri;

_caldav._caldav IN URI http://somehost.example.com/someotheruri;

I.e. if you know you want the carddav/caldav URI, you just look up the 
{IN,URI,_carddav._caldav.example.com} RRSET, if you want to know the services 
example.com has, you look up {IN,NAPTR,example.com} and then with flag D you 
see what you can find using lookup of URI RR.

So, the NAPTR and flag D is not really needed for the resolution. It is a 
list the services feature.

But, I will remove that part because it is not really a piece of the URI 
definition.

 For security considerations, I have one to add.  RFC 3958 (S-NAPTR) has this 
 nasty little authentication hitch, that you should really consider in this 
 draft.  The reference identifier (see draft-saintandre-tls-server-id-check) 
 that you are required to use for authenticating the host is the one that is 
 input to the resolution process...not the product of the process.
 
 Basically, if you search for _http._web.example.net and get 
 http://www.example.com/ , then you are expected to authenticate against 
 _http._web.example.net (or maybe example.net, I'm not sure - NAPTR doesn't 
 use the '_' prefix).

I thought you should authenticate against example.net?

I.e. you want caldav/caldav for example.com and get back 
http://www.calendarserverfoobar.com/caldav/example.com/caldav; (for a 
PROPFIND), what is the best to require for authentication? example.com or 
www.calendarserverfoobar.com? I presume example.com (the domain name used 
_before_ the URI lookup happens.

   Patrik


 I'm happy to expand on the problems that I faced with this little security 
 tangle.  The problem doesn't end there.




PGP.sig
Description: This is a digitally signed message part
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: The IPv6 Transitional Preference Problem

2010-06-23 Thread Carsten Bormann
On Jun 23, 2010, at 15:06, Martin Rex wrote:

 optimizing for their own interest alone

I don't know about you, but when I set up a server, I have a strong interest 
that my clients get their data fast.
So whatever it takes to do that, is in my interest.

BTW, initial analyses of iOS 4 (iPhone OS) show that they are always v6 enabled:
http://isc.sans.edu/diary.html?storyid=9058rss
It would be interesting to know how their v6/v4 preference goes.

They also appear to be using MAC-based addresses (as opposed to RFC4941/RFC3041 
privacy-enhanced).
If that is indeed true, that will be a *great* incentive for server operators 
to switch on NAT-free IPv6, once they start to understand the implications (no 
need for cookies any more :-).

Gruesse, Carsten

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-00

2010-06-23 Thread Jari Arkko

Spencer,

As I read http://www.rfc-editor.org/rfc/rfc5741.txt, Experimental RFCs 
would be Category: Experimental on the first page, and I'd expect them 
to be revised when they are reclassified, if only to make this say 
Category: Standards Track. So that's at least a small barrier to 
reclassification in place.


Yes, though that is something which could be handled by setting the 
tracker intended status and perhaps an RFC Editor note correctly to PS. 
The last call notice would say the correct thing after this, for 
instance. Its really very similar to what we've been doing for some 
documents already. RFC such and such for Draft and at that time such 
and such is still a PS, and a new RFC # will be allocated for the DS RFC.


Jari

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-00

2010-06-23 Thread Jari Arkko
I'm with Ran and others who stated that best is the enemy of good in 
this case. I think Russ' draft is a step in the right direction and will 
reduce complexity and effort. An incremental improvement. We should 
adopt it in Maastricht. And lets avoid too much fine-tuning or 
fragmentation of the proposals...


Having said that, I did have a couple of other observations. First, it 
has been repeatedly noted the IETF community has given up on advancing 
documents on the standards ladder. In some sense this is true. Out of 
the 122 documents currently in the RFC Editor queue, 0 are for Full 
Standard, 1 document (0.8%) is for Draft Standard, 8 (6%) are for 
Experimental, 28 (23%) are for Informational, and 83 (68%) are for 
Proposed Standard. However, 13 (11%) are bis documents of various sorts. 
And that's not a special occurrence, we do produce overall quite many 
revisions of existing RFCs. My interpretation is that while overall the 
community is not that interested in the standards levels, the IETF is 
still very interested in keeping our specifications up to date, 
correcting bugs and maybe in some cases even removing or adding some 
features. I think it is valuable work and needs to continue. And here is 
where in my opinion the possible value of the two-step ladder lies. The 
implementation reports may help in directing the bis draft to become 
simplified, and based on actual experience.


But I would also be OK with a one step model. You can draw running 
code support for that model from the above data.


Jari

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-01

2010-06-23 Thread Russ Housley
Dave:

This observation was based on many hallway discussions with many people
over many years.  You are correct to observe that there are many factors
at play, and many of them were discussed at the mic in plenary.  The
draft changes process in many different places.  I've attempted to
balance many differnt things in this proposal.  Only community
discussion will determine if the balance is acceptable.

There is always risk in process changes.  The goal is to make changes
where the benefits outweigh the risk.

Russ


On 6/23/2010 5:25 AM, Dave CROCKER wrote:
 
 Russ,
 
 In reading the latest version of your proposal, I finally realized that
 a motivating premise:
 
 o Since many documents are published as Proposed Standard and never
   advances to a higher maturity level, the initial publication
   receives much more scrutiny that is call for by RFC 2026 [1].
 
 is well-intentioned, sounds reasonable, but is actually without any
 practical foundation.  In other words, we do not know that the premise
 is valid.
 
 There are many likely reasons that the process of getting through the
 IESG, for Proposed, has become such a high burden.  (Perhaps you did not
 mean to limit the reference to mean only IESG scrutiny, but in formal
 terms, it really is the only one that matters, in terms of 'scrutiny'.)
 
 I think that a detached and thorough exploration of those possible
 reasons is likely to show that the problem pre-dates the move towards
 leaving documents at Proposed and, in fact, well might have contributed
 to it.  By virtue of having Proposed be so difficult to attain, there is
 a disincentive for going through the process again, for the same protocol.
 
 A tendency for all of us in this kind of topic is to make simple
 assertions of cause or of likely behavioral change that sound reasonable
 but have little empirical basis.
 
 We need to be careful to avoid falling into that trap, because the
 changes being discussed are strategic, and could well be impossible to
 reverse completely...
 
 d/
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-two-maturity-levels-01

2010-06-23 Thread Dave CROCKER


Russ,

In reading the latest version of your proposal, I finally realized that a 
motivating premise:



o Since many documents are published as Proposed Standard and never
  advances to a higher maturity level, the initial publication
  receives much more scrutiny that is call for by RFC 2026 [1].


is well-intentioned, sounds reasonable, but is actually without any practical 
foundation.  In other words, we do not know that the premise is valid.


There are many likely reasons that the process of getting through the IESG, for 
Proposed, has become such a high burden.  (Perhaps you did not mean to limit the 
reference to mean only IESG scrutiny, but in formal terms, it really is the only 
one that matters, in terms of 'scrutiny'.)


I think that a detached and thorough exploration of those possible reasons is 
likely to show that the problem pre-dates the move towards leaving documents at 
Proposed and, in fact, well might have contributed to it.  By virtue of having 
Proposed be so difficult to attain, there is a disincentive for going through 
the process again, for the same protocol.


A tendency for all of us in this kind of topic is to make simple assertions of 
cause or of likely behavioral change that sound reasonable but have little 
empirical basis.


We need to be careful to avoid falling into that trap, because the changes being 
discussed are strategic, and could well be impossible to reverse completely...


d/

--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: motivations (was: Re: draft-housley-two-maturity-levels-00)

2010-06-23 Thread RJ Atkinson

On 23  Jun 2010, at 08:45 , Eliot Lear wrote:
 And now as to your specifics, you have placed a lot of weight on one
 example, seemingly extrapolating from it, the Joint Interoperability
 Test Command.  I have no experience working with them, and defer to
 yours.  However, when you say,

Again, you setup an incorrect strawman, and then knock it down.

In the quote (below), I also mentioned the various IPv6
Profile documents around the world, which you ignore,
apparently in order to incorrectly characterise my note 
as using a single example.  There are a number of cases
where a large customer's requirements (in RFPs or Tender
opportunities) have driven feature priorities.  The TIC
and JITC are merely examples.  Numerous other examples
exist, including a large bank in central Europe and 
several ISPs.

  As examples, the JITC and TIC requirements pay a great
  deal of attention to whether some technology is past PS.
  Various IPv6 Profile documents around the world also pay
  much attention to whether a particular specification is
  past PS.
 
 It leads to the following questions:
 
* Would the vendors have implemented the functionality ANYWAY? 
  Specifically, would other RFPs have already driven vendors in this
  direction?  Can you cite a counter example, where that was not the
  case?

Yes.

There are certainly numerous cases where vendor implementation 
timing and new feature prioritisation were directly impacted 
by a profile document cited in some RFP, and where that profile
document's contents were directly impacted by whether a
particular technology was at Proposed Standard or some more
advanced stage in the IETF processes.

The most obvious examples come from the various IPv6 Profiles
around the world.  There are some number of these in Japan,
in Europe, in the USA, and in other countries.

Various examples also exist outside the IPv6 Profile universe,
including but not limited to large customers (e.g. the JITC and TIC).

* Is the defense industry at all representative of the broader
  market?  My own experience leads to an answer of, “barely at all”,
  and this has been assuredly the case with the Internet where a
  huge portion has run on on PS, Internet-Drafts, and proprietary
  standards, and not waited for advancement.  Examples have included
  BGP, MPLS-VPNs, HTTP, SSL, and Netflow, just to name a few. 

I provided non-defense examples in both my original note
(which examples you have ignored for some reason) and also
in my response above.

 The IETF already has a tendency to be very vendor-focused 
 vendor-driven.  It is best, however, if the IETF keeps the 
 interests of both communities balanced (rather than tilting 
 towards commercial vendors).
 While this is a perhaps laudable idea, someone has to do the work to get
 specifications to the next standards level.  The whole point of my
 questions is to determine what motivations that someone might have for
 actually performing that work.

I was quite detailed on that front, although you seem to have
selectively ignored that part of my note.

 There's no need to be rude or snarky with me, even if you disagree.  

I wasn't rude, and can't find snarky in the OED.

 You are looking at this from the angle of the customers, and that's
 perfectly reasonable.  I'm looking at it from the developers' point of
 view, and from the supply side of your equation. 

I've been both customer/user/operator and vendor/implementer
at various points in time.  So I look at it from both points
of view, and my earlier note included discussion of both
vendor advantages and user/operator/customer advantages.

It seems quite odd that you seem to have ignored my note 
so selectively.

  B) whether that signal has a feedback loop to implementers/
 vendors that still works.
  The answer to this is also clearly YES.  Technologies that
  appear in RFPs or Tender Requirements have a stronger
  business case for vendors/implementers, hence are more
  likely to be widely implemented.
 
 Certainly so, but I don't understand how you made the leap of logic from
 your question to your answer.  Do we have situations, for instance,
 where a proposed standard is compared to a draft standard, or a draft
 standard is compared to a full standard, and one is chosen over the
 other?  

Yes, we do.

 If so, are they the norm, and are they likely to drive
 implementation?  

Such decisions in various IPv6 Profiles around the world,
in large customer requirements documents around the world
(e.g. JITC, TIC) regularly have driven implementation priorities 
and new feature timetables in the past.  

Folks at many vendors have experienced this.  I witnessed
it at every vendor I've ever worked for.  It isn't a surprise 
that a business case would drive these things NOR is it 
a surprise that standards status would drive an RFP 
(and hence drive the business case).

 Also, if all this gets you is 

Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Patrik Fältström
On 23 jun 2010, at 16.33, Richard L. Barnes wrote:

 In principle, example.com is the proper domain to authenticate, but in 
 practice, that causes a lot of problems.  Consider the case where the target 
 of the redirection is a separate entity from the origin; this could arise, 
 for example, in a situation whereexample.com has outsourced its calendaring 
 services to calendardserverfoobar.com.

So, the connect the dots is to:

- Announce the fact example.com is hosted at calendarserverfoobar.com (with 
some URL) in DNS

- Secure that announcement in DNS with DNSSEC

- Verify the SSL (for example) cert for the connection to 
calendarserverfoobar.com matches

- Do application layer authentication etc over the then encrypted connection

Sounds ok?

   Patrik



PGP.sig
Description: This is a digitally signed message part
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Richard L. Barnes
Basically, yeah, as long as you have DNSSEC.  In fact, if you've got  
DNSSEC, you don't really even need the application-specific bit at the  
end.  The goal of the XMPP DNA work (and other analogous things) is to  
work around not having DNSSEC in the mean time.  In that solution, the  
parallel path is:


- Announce the fact that example.com is hosted at  
clendarserverfoobar.com in DNS


- Connect to calendarserverfoobar.com over TLS and check that the name  
in the cert is indeed calendarfoobar.com


- Obtain an attribute cert for calendarfoobar.com signed by example.com

- Valid signature and certificate for example.com implies that  
delegation is OK


The third of these steps of course require some application-specific  
magic.


--Richard


On Jun 23, 2010, at 2:52 PM, Patrik Fältström wrote:


On 23 jun 2010, at 16.33, Richard L. Barnes wrote:

In principle, example.com is the proper domain to authenticate, but  
in practice, that causes a lot of problems.  Consider the case  
where the target of the redirection is a separate entity from the  
origin; this could arise, for example, in a situation  
whereexample.com has outsourced its calendaring services to  
calendardserverfoobar.com.


So, the connect the dots is to:

- Announce the fact example.com is hosted at  
calendarserverfoobar.com (with some URL) in DNS


- Secure that announcement in DNS with DNSSEC

- Verify the SSL (for example) cert for the connection to  
calendarserverfoobar.com matches


- Do application layer authentication etc over the then encrypted  
connection


Sounds ok?

  Patrik



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Cyrus Daboo

Hi Patrik,

--On June 23, 2010 8:52:45 PM +0200 Patrik Fältström p...@cisco.com 
wrote:



In principle, example.com is the proper domain to authenticate, but in
practice, that causes a lot of problems.  Consider the case where the
target of the redirection is a separate entity from the origin; this
could arise, for example, in a situation whereexample.com has outsourced
its calendaring services to calendardserverfoobar.com.


So, the connect the dots is to:

- Announce the fact example.com is hosted at calendarserverfoobar.com
(with some URL) in DNS

- Secure that announcement in DNS with DNSSEC

- Verify the SSL (for example) cert for the connection to
calendarserverfoobar.com matches


So the srv-caldav (and srv-email) drafts reference Section 3 of 
draft-saintandre-tls-server-id-check which describes how clients can go 
about verifying a server identity when using TLS under various 
circumstances, including an initial discovery via SRV records.



- Do application layer authentication etc over the then encrypted
connection

Sounds ok?


Well the key here is DNSSEC of course!

--
Cyrus Daboo

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Cyrus Daboo

Hi Patrik,

--On June 22, 2010 8:54:22 AM +0200 Patrik Fältström p...@cisco.com 
wrote:



I have together with Olaf Kolkman suggested a new RR type that I call URI
that work similarly to what is described in this draft (regarding the
owner of the RRSET), but a URI in the RDATA. It has been posted to the
namedroppers list a few times...but maybe that has been wrong. Maybe Apps
Area should have been notified about the work a bit more...

Cyrus has asked a few questions about it, and maybe it is me that have
not reached out to the Caldav people enough? I have tried to push it
through via the DNS people in the IETF, but there have not been enough
traction.


I did chat with a few server implementors about this and the feeling was 
SRV + .well-known is a good solution that can quickly be deployed. Some 
points:


1) SRV's are very deployable today - a new RR will be harder to deploy.

2) There is a push to support SRV's with other protocols (e.g. 
draft-daboo-srv-email for IMAP, POP3, and Submission) so from an 
operational standpoint its likely to be more common.


3) .well-known is useful in the absence of any DNS records. i.e. if no 
SRV/URI were available, a client can still try auto-discovery by attempting 
an HTTP connection to the host (derived from user input) and the 
.well-known path.


--
Cyrus Daboo

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Patrik Fältström
On 23 jun 2010, at 21.20, Cyrus Daboo wrote:

 I did chat with a few server implementors about this and the feeling was SRV 
 + .well-known is a good solution that can quickly be deployed. Some points:
 
 1) SRV's are very deployable today - a new RR will be harder to deploy.
 
 2) There is a push to support SRV's with other protocols (e.g. 
 draft-daboo-srv-email for IMAP, POP3, and Submission) so from an operational 
 standpoint its likely to be more common.
 
 3) .well-known is useful in the absence of any DNS records. i.e. if no 
 SRV/URI were available, a client can still try auto-discovery by attempting 
 an HTTP connection to the host (derived from user input) and the .well-known 
 path.

Hmm...regarding the new RR, the only thing I can think of today is the need for 
some changes in the provisioning system from which one create the DNS zones. I 
do not know of any DNS code today that can not handle unknown DNS RR Types, 
but maybe I am wrong? I am though confused over (1) as this is 2010 and not 
1998.

Regarding (3), I think it is sad people move redirects and lookups and 
functionality to be on top of HTTP instead of IP. And I do not understand in 
the absence of DNS...that is an interesting situation ;-) Specifically to use 
that as the foundation for the architecture to use for calendaring, that is -- 
I hope -- one of the more fundamental applications on the Internet.

A new version of my draft I promised today, but due to this security 
consideration discussion, it is now delayed yet another day.

And yes, I will do the job of releasing a new version although there will 
continue to not be any interest of using it. :-)

Or maybe I should just push it through, although for calendaring 
draft-daboo-srv-caldav will be used. Hmm... I do not want to be problematic 
here.

   Patrik



PGP.sig
Description: This is a digitally signed message part
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Cyrus Daboo

Hi Patrik,

--On June 23, 2010 10:07:44 PM +0200 Patrik Fältström p...@cisco.com 
wrote:



I did chat with a few server implementors about this and the feeling was
SRV + .well-known is a good solution that can quickly be deployed. Some
points:

1) SRV's are very deployable today - a new RR will be harder to deploy.

2) There is a push to support SRV's with other protocols (e.g.
draft-daboo-srv-email for IMAP, POP3, and Submission) so from an
operational standpoint its likely to be more common.

3) .well-known is useful in the absence of any DNS records. i.e. if no
SRV/URI were available, a client can still try auto-discovery by
attempting an HTTP connection to the host (derived from user input) and
the .well-known path.


Hmm...regarding the new RR, the only thing I can think of today is the
need for some changes in the provisioning system from which one create
the DNS zones. I do not know of any DNS code today that can not handle
unknown DNS RR Types, but maybe I am wrong? I am though confused over
(1) as this is 2010 and not 1998.


I am thinking more of client APIs.


Regarding (3), I think it is sad people move redirects and lookups and
functionality to be on top of HTTP instead of IP. And I do not understand
in the absence of DNS...that is an interesting situation ;-)
Specifically to use that as the foundation for the architecture to use
for calendaring, that is -- I hope -- one of the more fundamental
applications on the Internet.


Sorry - bad wording on my part. What I meant was in the absence of a 
service-type to hostname mapping in the DNS.


--
Cyrus Daboo

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Paul Hoffman
At 3:20 PM -0400 6/23/10, Cyrus Daboo wrote:
3) .well-known is useful in the absence of any DNS records. i.e. if no SRV/URI 
were available, a client can still try auto-discovery by attempting an HTTP 
connection to the host (derived from user input) and the .well-known path.

This sounds weird to me. The tradeoff is using two different protocols (DNS and 
HTTP) versus one (DNS). For schemes that are not being run over HTTP, that 
means that the client needs to add an HTTP client stack just to find the right 
server. Is this really a good idea?

--Paul Hoffman, Director
--VPN Consortium
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


By any chance does anyone know who is the SIP guy/gal at Apple?

2010-06-23 Thread Richard Shockey
Aka FaceTime?

 

Some of us in the RAI directorate would like to extend a welcoming hand. J 

 

Plus see what the SDP looks like etc , interop options, naming, where is the
rendezvous server, etal. 

 

Small stuff. 

 

Richard Shockey
Shockey Consulting
Chairman of the Board of Directors SIP Forum
PSTN Mobile: +1 703.593.2683
 mailto:richard(at)shockey.us mailto:richard(at)shockey.us
skype: rshockey101
LinkedIn :  http://www.linkedin.com/in/rshockey101
http://www.linkedin.com/in/rshockey101
http//www.sipforum.org

 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-daboo-srv-caldav (Use of SRV records for locating CalDAV and CardDAV services) to Proposed Standard

2010-06-23 Thread Patrik Fältström
On 23 jun 2010, at 23.05, Cyrus Daboo wrote:

 Hmm...regarding the new RR, the only thing I can think of today is the
 need for some changes in the provisioning system from which one create
 the DNS zones. I do not know of any DNS code today that can not handle
 unknown DNS RR Types, but maybe I am wrong? I am though confused over
 (1) as this is 2010 and not 1998.
 
 I am thinking more of client APIs.

Sure, but, support for unknown RR Types is said to be needed since long time 
back. And what API do not handle the ability to request an RR with a specific 
RRTYPE?

int res_query(const char *dname, int class, int type, u_char *answer, int 
anslen);

Anyway...this discussion has been held in the IETF I do not know how many 
times. Instead of writing another 10 lines of code (or whatever is needed) 
people fall back to existing RR Types, and not only that, define future 
protocols because of lack of #define for new RRTYPES.

I know people have different views here, and I have one specific view ;-)

   Patrik



PGP.sig
Description: This is a digitally signed message part
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RFC 5922 on Domain Certificates in the Session Initiation Protocol (SIP)

2010-06-23 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5922

Title:  Domain Certificates in the Session 
Initiation Protocol (SIP) 
Author: V. Gurbani, S. Lawrence,
A. Jeffrey
Status: Standards Track
Stream: IETF
Date:   June 2010
Mailbox:v...@alcatel-lucent.com, 
scott-i...@skrb.org, 
ajeff...@alcatel-lucent.com
Pages:  17
Characters: 37667
Updates:RFC3261

I-D Tag:draft-ietf-sip-domain-certs-07.txt

URL:http://www.rfc-editor.org/rfc/rfc5922.txt

This document describes how to construct and interpret certain
information in a PKIX-compliant (Public Key Infrastructure using
X.509) certificate for use in a Session Initiation Protocol (SIP)
over Transport Layer Security (TLS) connection.  More specifically,
this document describes how to encode and extract the identity of a
SIP domain in a certificate and how to use that identity for SIP
domain authentication.  As such, this document is relevant both to
implementors of SIP and to issuers of certificates.  [STANDARDS TRACK]

This document is a product of the Session Initiation Protocol Working Group of 
the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5923 on Connection Reuse in the Session Initiation Protocol (SIP)

2010-06-23 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5923

Title:  Connection Reuse in the Session 
Initiation Protocol (SIP) 
Author: V. Gurbani, Ed.,
R. Mahy, B. Tate
Status: Standards Track
Stream: IETF
Date:   June 2010
Mailbox:v...@alcatel-lucent.com, 
ro...@ekabal.com, 
br...@broadsoft.com
Pages:  19
Characters: 41905
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-sip-connect-reuse-14.txt

URL:http://www.rfc-editor.org/rfc/rfc5923.txt

This document enables a pair of communicating proxies to reuse a
congestion-controlled connection between themselves for sending
requests in the forwards and backwards direction.  Because the
connection is essentially aliased for requests going in the backwards
direction, reuse is predicated upon both the communicating endpoints
authenticating themselves using X.509 certificates through Transport
Layer Security (TLS).  For this reason, we only consider connection
reuse for TLS over TCP and TLS over Stream Control Transmission
Protocol (SCTP).  This document also provides guidelines on
connection reuse and virtual SIP servers and the interaction of
connection reuse and DNS SRV lookups in SIP.  [STANDARDS TRACK]

This document is a product of the Reliable Multicast Transport Working Group of 
the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5924 on Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates

2010-06-23 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5924

Title:  Extended Key Usage (EKU) for 
Session Initiation Protocol (SIP) X.509 Certificates 
Author: S. Lawrence, V. Gurbani
Status: Experimental
Stream: IETF
Date:   June 2010
Mailbox:scott-i...@skrb.org, 
v...@bell-labs.com
Pages:  8
Characters: 16868
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-sip-eku-08.txt

URL:http://www.rfc-editor.org/rfc/rfc5924.txt

This memo documents an extended key usage (EKU) X.509 certificate
extension for restricting the applicability of a certificate to use
with a Session Initiation Protocol (SIP) service.  As such, in
addition to providing rules for SIP implementations, this memo also
provides guidance to issuers of certificates for use with SIP. 
This document defines an Experimental Protocol for the Internet
community.

This document is a product of the Session Initiation Protocol Working Group of 
the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce