Re: Fisking vs Top-Posting

2010-09-24 Thread Sabahattin Gucukoglu
On 22 Sep 2010, at 19:48, Tony Finch wrote:
 On Wed, 22 Sep 2010, Dave Cridland wrote:
 Possibly. It's worth noting that format-flowed, for instance, is well
 supported
 
  with the notable exception of Outlook. Apple's MUAs have stopped using
 format=flowed and now use really long lines instead, because that give
 better interop with the market leader. This is rather sad.

It is very sad.  So I wasn't mistaken - Apple Mail used to do the right thing, 
and now no longer does. Please file bug reports at 
http://bugreporter.apple.com/ .  With enough Duplicates it's possible Apple 
will listen to reason, but ...  Meantime I'll have to post to netnews using a 
newsreader in order to avoid being flamed to death by users of readers which 
decode the QP-encoding but then don't wrap the long lines, or don't do MIME.

Just out of curiosity, where did you get confirmation that Apple Mail behaves 
the way it does for the reason it does?

Cheers,
Sabahattin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Fisking vs Top-Posting

2010-09-24 Thread Tony Finch
On Fri, 24 Sep 2010, Sabahattin Gucukoglu wrote:

 Just out of curiosity, where did you get confirmation that Apple Mail
 behaves the way it does for the reason it does?

Can't remember, sorry.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
HUMBER THAMES DOVER WIGHT PORTLAND: NORTH BACKING WEST OR NORTHWEST, 5 TO 7,
DECREASING 4 OR 5, OCCASIONALLY 6 LATER IN HUMBER AND THAMES. MODERATE OR
ROUGH. RAIN THEN FAIR. GOOD.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


DNS spoofing at captive portals

2010-09-24 Thread Michael Richardson

Has the IETF (or rather then IAB) written any simple documents that
explain to less informed (i.e. marketing/product) managers why it is a
bad thing for a captive portal to spoof DNS replies?
(not just in regard to DNSSEC, but also in regards to just caching)

-- 
]   He who is tired of Weird Al is tired of life!   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
   then sign the petition. 



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Fisking vs Top-Posting

2010-09-24 Thread John C Klensin


--On Thursday, September 23, 2010 10:43 -0700 Randy Dunlap
rdun...@xenotime.net wrote:

...
 the same people also complain when I trim.
 
 So its a combination of pathological behaviours, UI, and
 dominance behaviour
 
 That should just be a function of where the UI software
 positions the cursor, shouldn't it?

Well, it is a bit more than that.  If one had a UI that combines:

-- Small screen with tricky selection and scrolling

-- Insertion of prior messages in the reply with a
---original message-- line above them, rather than
quoting.  Note that, when this is done, the cursor
inevitably ends up above the message.

-- No mechanism for selecting which text is to be quoted
as part of the reply command (or button, or whatever)

or even any two of those, then one is quite likely to see
top-posting -- almost anything else is just too time-consuming.

In a better world, the right solution to that type of problem
is certainly go find a decent MUA.  But, in a world in which
the number of MUAs that are well-designed and competently
maintained to keep up with technology developments appears to be
rapidly declining, the decision to switch tends to involve
complex usability and feature tradeoffs, not a straightforward
decision to go to something better.

In (slight) defense of top-posting (which I definitely choose to
do sometimes), if one is replying very briefly and in summary to
a long and complex message, it is often more efficient for both
the writer and the reader.  One should clearly also trim the
long message, but, if people get in a hurry and forget ... well,
I would hope that we will never again see a time in which the
bandwidth or disk space requirements for a few extra paragraphs
are sufficiently expensive to be more important than people's
time.

FWIW, the thing that really irritates me is having someone
respond to a message after quoting only a few lines (often good)
but without supplying some clue that permits me to find the
message being replied to if needed.  Whether that is done by
inserting some sort of attribution line, copying the author of
the prior message on the reply, or even using a good In-reply-to
field, assuming that one can quote a few lines, without
attribution, because the recipient has obviously read the
prior sequence of messages --in sequence and recently-- is just
unrealistic, at least IMO.  Again, the causes of the problem of
replies without prior message context are often more poor UA
design than bad user behavior, but that brings us back to the
declining population of decent UAs.

john



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Fisking vs Top-Posting

2010-09-24 Thread Randy Dunlap
On Fri, 24 Sep 2010 09:09:08 -0400 John C Klensin wrote:

 
 
 --On Thursday, September 23, 2010 10:43 -0700 Randy Dunlap
 rdun...@xenotime.net wrote:
 
 ...
  the same people also complain when I trim.
  
  So its a combination of pathological behaviours, UI, and
  dominance behaviour
  
  That should just be a function of where the UI software
  positions the cursor, shouldn't it?
 
 Well, it is a bit more than that.  If one had a UI that combines:
 
   -- Small screen with tricky selection and scrolling
   
   -- Insertion of prior messages in the reply with a
   ---original message-- line above them, rather than
   quoting.  Note that, when this is done, the cursor
   inevitably ends up above the message.

I don't think that the cursor has to end up there.  That's the MUA
and it could control where the cursor ends up.

   -- No mechanism for selecting which text is to be quoted
   as part of the reply command (or button, or whatever)
 
 or even any two of those, then one is quite likely to see
 top-posting -- almost anything else is just too time-consuming.
 
[snip]
 
 In (slight) defense of top-posting (which I definitely choose to
 do sometimes), if one is replying very briefly and in summary to
 a long and complex message, it is often more efficient for both
 the writer and the reader.  One should clearly also trim the
 long message, but, if people get in a hurry and forget ... well,

Forget?  oh, you are just being too nice.  ;)

 I would hope that we will never again see a time in which the
 bandwidth or disk space requirements for a few extra paragraphs
 are sufficiently expensive to be more important than people's
 time.

Yes, I agree, it's about people's time.

 FWIW, the thing that really irritates me is having someone

Ack that.

One thing that bothers me is when people do mixed-line posting
but end their reply say,  50% thru the message, but then they
don't delete the rest of the message, so the reader has to scan
the rest of the message to see if there are more comments.

This saves time for the (one) sender and wastes time for N readers.

---
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code ***
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Posting Placement (was Re: Fisking vs Top-Posting)

2010-09-24 Thread Joel M. Halpern
I tend to assume that people write emails the way they would like to 
read them.


Thus, if I am writing an email with a lot of detailed context from a 
previous message, I include the revelant portions of the message, and 
reply in line.


However, when I am writing A reply that does not require detailed 
context, but may depend upon some context for either those who have not 
been reading everything, or the cases where the thread is complex enough 
that checking which piece one is responding to (even when the subject 
should not have changed) can be helpful,

then I top post.

Why do I top-post?
Because I prefer to read email in the preview pane of my email reader. 
It is much faster for me to read.  Top-posts I can generally read in the 
preview pane with 0 additional clicks.  I can go scroll down and read 
the selected context if I need that.
In contrast, with a bottom post I have to scroll through the whole 
thread, most of which I have read before, just to find out what this 
poster is adding.


Since, as a reader, I strongly prefer to read top-posts, that is how I 
usually post.


In this case, it is pretty clear that the details of the earlier 
conversation are relevant only to prove that a conversation is taking 
place, so I will assume readers who care have read those posts, and I 
have deleted it all.


It is very true that if you are trying to parse a thread that you have 
not been following, a thread where everyone has bottom posted, while 
retaining sufficient context, is MUCH easier to figure out.  I have had 
more than one thread where I have had to read the top-posts backwards 
from the bottom to figure out what the heck is going on.

But that, for me, is a rare case.

Other people probably read differently.  So I do not claim that my 
reading experience is relevant for how other people shoudl post.  I will 
cope however things are posted.


I do want to re-iterate two points I have seen that are important.  Both 
are relevant no matter what style of posting you like.
1) People need to read the whole email before composing their response. 
 (You can draft ideas while reading, but make sure you actually read 
the whole thing before you finalise your response.)
2) People need to edit longer threads so that they do not copy large 
amounts of redundant and useless text.


I will note on 1 that the satiric demonstration of this that followed 
shortly after the initial note was just beautiful.  Thank you.


Yours,
Joel M. Halpern

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [certid] Why require EKU for certid?

2010-09-24 Thread Henry B. Hotz

On Sep 22, 2010, at 9:44 AM, Paul Hoffman wrote:

 At 10:21 AM -0600 9/22/10, Peter Saint-Andre wrote:
 On 9/14/10 12:51 AM, Stefan Santesson wrote:
 General:
 I would consider stating that server certificates according to this profile
 either MUST or SHOULD have the serverAuth EKU set since it is allways
 related to the use of TSL and server authentication. At least it MUST be set
 when allowing checks of the CN-ID (see 2.3 below).
 
 [..snip..]
 

 What possible advantage is there to making certificates that do not have this 
 flag set be excluded from the practices you are defining? That is, if a TLS 
 client gets a certificate from a TLS server that the TLS server says is its 
 authentication certificate, why should the client care whether or not that 
 flag is set? That flag is an assertion from the CA, not from the server who 
 is authenticating.


Does this point need discussion?  Without checking, I suspect that 5280 says 
you obey the EKU, period.  OTOH I think Paul raises a valid point.

OTOH (again) one could argue that the EKU provides a way to prevent a stolen 
cert/key issued to the machine for a different function from being repurposed 
to support a fake server.  (I'm not convinced this is significant, but it's 
something.)

Absent discussion and consensus, I vote for whatever 5280 says, which I suppose 
is what the current silence on the topic equates to.
--
The opinions expressed in this message are mine,
not those of Caltech, JPL, NASA, or the US Government.
henry.b.h...@jpl.nasa.gov, or hbh...@oxy.edu



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [TLS] [certid] [secdir] secdir review of draft-saintandre-tls-server-id-check-09

2010-09-24 Thread Marsh Ray

On 09/23/2010 01:10 PM, Richard L. Barnes wrote:

There is no black magic here, only the magic of the TLS server_name
extension. If the client provides server_name=gmail.com, the server
provides a gmail.com cert, otherwise it defaults to mail.google.com.
 Your browser is following two secure delegations before it lands at
 www.google.com (gmail.com - mail.google.com - www.google.com).


I'd not even considered SNI.


My guess based on the anecdotes in the thread is that IE8 doesn't
support it.


Not IE8, but the pre-Vista Windows I was testing it on that doesn't do
extensions by default.

Which is why I'd not considered that gmail would depend on SNI for
its operation. I'd forgotten that this is Google we were talking about 
and not any other company in the world that would put support for MSIE 
on Windows XP ahead of protocol standards. :-)



(You should also be more careful about your HTTP emulation! A client
 MUST include a Host header field in all HTTP/1.1 request messages
.)


Yep, that's why I requested HTTP/1.0.

- Marsh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread Alfred Hönes
At Fri, 24 Sep 2010 07:21:21 -0400,  Michael Richardson wrote:

 Has the IETF (or rather then IAB) written any simple documents that
 explain to less informed (i.e. marketing/product) managers why it
 is a bad thing for a captive portal to spoof DNS replies?
 (not just in regard to DNSSEC, but also in regards to just caching)

a) Most of the arguments explained in the 2003 IAB Commentary:
   Architectural Concerns on the use of DNS Wildcards,
   http://www.IAB.ORG/documents/docs/2003-09-20-dns-wildcards.html,
   apply in a similar fashion, but it indeed would be a good idea
   to produce such document.  I think much text from 2003 could
   be leveraged.

b) It should be clearly spelled out that this practice falls among the
   category of actions commonly known as man-in-the-middle attacks.

c) draft-livingood-dns-redirect and draft-livingood-dns-malwareprotect
   descibe these services in a much too friendly tone;
   terms like service and benefits for users are clearly
   abuse of language -- the above IAB statement already indicates
   that similar interference with the DNS causes severe damage
   to user perception and performance.
   These drafts should clearly spell out the downside of these
   methods and their fundamental nature, being MitM attacks.

d) In my personal opinion, the original idea of having recursive
   DNS resolvers located close to the hosts should be given more
   traction again in the future.  All kinds of SOHO access gateways
   or home gateways should preferably offer (locally) full recursive
   and validating DNS resolution service.  The ISP-based DNS recursor
   was (and perhaps still is) a good idea in low-bandwidth (dial-in)
   access networks, where the (bandwidth and monetary) costs of full
   DNS service actually matter and are detrimental for the users, but
   it does not make sense any more for broadband access networks with
   (almost) bandwidth-usage independent billing models (flat rates).

   Thus the dependency on (both technically and policy-wise!) powerful
   central caching resolvers could be reduced dramatically.
   DNSSEC validation makes most sense for applications when performed
   as close as possible to the stub resolver, if the latter cannot
   perform this function itself; this way, the unprotected path
   at least is constrained to within the users' sites and hence their
   own administrative domain.
   Experience has shown that huge central resolver systems are very
   attractive targets for external attacks as well as for insider
   attacks (like ${subject}).

Kind regards,
  Alfred Hönes.

-- 

+++
| TR-Sys Alfred Hoenes   |  Alfred Hoenes   Dipl.-Math., Dipl.-Phys.  |
| Gerlinger Strasse 12   |  Phone: (+49)7156/9635-0, Fax: -18 |
| D-71254  Ditzingen |  E-Mail:  a...@tr-sys.de |
+++

-
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread Richard L. Barnes
This document is probably relevant, although it goes the route of  
providing guidelines for minimum breakage rather than forbidding.

http://tools.ietf.org/html/draft-livingood-dns-redirect-02


On Sep 24, 2010, at 8:38 AM, Alfred HÎnes wrote:


At Fri, 24 Sep 2010 07:21:21 -0400,  Michael Richardson wrote:


Has the IETF (or rather then IAB) written any simple documents that
explain to less informed (i.e. marketing/product) managers why it
is a bad thing for a captive portal to spoof DNS replies?
(not just in regard to DNSSEC, but also in regards to just caching)


a) Most of the arguments explained in the 2003 IAB Commentary:
  Architectural Concerns on the use of DNS Wildcards,
  http://www.IAB.ORG/documents/docs/2003-09-20-dns-wildcards.html,
  apply in a similar fashion, but it indeed would be a good idea
  to produce such document.  I think much text from 2003 could
  be leveraged.

b) It should be clearly spelled out that this practice falls among the
  category of actions commonly known as man-in-the-middle attacks.

c) draft-livingood-dns-redirect and draft-livingood-dns-malwareprotect
  descibe these services in a much too friendly tone;
  terms like service and benefits for users are clearly
  abuse of language -- the above IAB statement already indicates
  that similar interference with the DNS causes severe damage
  to user perception and performance.
  These drafts should clearly spell out the downside of these
  methods and their fundamental nature, being MitM attacks.

d) In my personal opinion, the original idea of having recursive
  DNS resolvers located close to the hosts should be given more
  traction again in the future.  All kinds of SOHO access gateways
  or home gateways should preferably offer (locally) full recursive
  and validating DNS resolution service.  The ISP-based DNS recursor
  was (and perhaps still is) a good idea in low-bandwidth (dial-in)
  access networks, where the (bandwidth and monetary) costs of full
  DNS service actually matter and are detrimental for the users, but
  it does not make sense any more for broadband access networks with
  (almost) bandwidth-usage independent billing models (flat rates).

  Thus the dependency on (both technically and policy-wise!) powerful
  central caching resolvers could be reduced dramatically.
  DNSSEC validation makes most sense for applications when performed
  as close as possible to the stub resolver, if the latter cannot
  perform this function itself; this way, the unprotected path
  at least is constrained to within the users' sites and hence their
  own administrative domain.
  Experience has shown that huge central resolver systems are very
  attractive targets for external attacks as well as for insider
  attacks (like ${subject}).

Kind regards,
 Alfred HÎnes.

--

+ 
++
| TR-Sys Alfred Hoenes   |  Alfred Hoenes   Dipl.-Math., Dipl.- 
Phys.  |
| Gerlinger Strasse 12   |  Phone: (+49)7156/9635-0, Fax:  
-18 |
| D-71254  Ditzingen |  E-Mail:  a...@tr- 
Sys.de |
+ 
++


-
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Posting Placement (was Re: Fisking vs Top-Posting)

2010-09-24 Thread Marshall Eubanks

On Sep 24, 2010, at 11:36 AM, Joel M. Halpern wrote:

 I tend to assume that people write emails the way they would like to read 
 them.
 
 Thus, if I am writing an email with a lot of detailed context from a previous 
 message, I include the revelant portions of the message, and reply in line.
 
 However, when I am writing A reply that does not require detailed context, 
 but may depend upon some context for either those who have not been reading 
 everything, or the cases where the thread is complex enough that checking 
 which piece one is responding to (even when the subject should not have 
 changed) can be helpful,
 then I top post.
 
 Why do I top-post?
 Because I prefer to read email in the preview pane of my email reader. It is 
 much faster for me to read.  Top-posts I can generally read in the preview 
 pane with 0 additional clicks.  I can go scroll down and read the selected 
 context if I need that.
 In contrast, with a bottom post I have to scroll through the whole thread, 
 most of which I have read before, just to find out what this poster is adding.
 
 Since, as a reader, I strongly prefer to read top-posts, that is how I 
 usually post.
 

I don't much care, but in general I think that a simple WFM or the like 
should be top posted; otherwise go with what seems the most natural to read. 

Regards
Marshall

 In this case, it is pretty clear that the details of the earlier conversation 
 are relevant only to prove that a conversation is taking place, so I will 
 assume readers who care have read those posts, and I have deleted it all.
 
 It is very true that if you are trying to parse a thread that you have not 
 been following, a thread where everyone has bottom posted, while retaining 
 sufficient context, is MUCH easier to figure out.  I have had more than one 
 thread where I have had to read the top-posts backwards from the bottom to 
 figure out what the heck is going on.
 But that, for me, is a rare case.
 
 Other people probably read differently.  So I do not claim that my reading 
 experience is relevant for how other people shoudl post.  I will cope however 
 things are posted.
 
 I do want to re-iterate two points I have seen that are important.  Both are 
 relevant no matter what style of posting you like.
 1) People need to read the whole email before composing their response.  (You 
 can draft ideas while reading, but make sure you actually read the whole 
 thing before you finalise your response.)
 2) People need to edit longer threads so that they do not copy large amounts 
 of redundant and useless text.
 
 I will note on 1 that the satiric demonstration of this that followed shortly 
 after the initial note was just beautiful.  Thank you.
 
 Yours,
 Joel M. Halpern
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread Livingood, Jason


 c) draft-livingood-dns-redirect and draft-livingood-dns-malwareprotect

draft-livingood-dns-malwareprotect concerns what is primarily an opt-in
service to block known malware sites for end users.  Hopefully that is
less controversial than the redirect one, but who knows.

draft-livingood-dns-redirect was written to do two things.  First was to
document a relatively long-standing process in a reference-able IETF
document where no documentation previously existed.  Second was to
document the best or least worst way to approach it, if a party was
planning to do so.  Since that time, I've added a bunch of stuff related
to DNSSEC to make clear an incompatibility there.  I'm a bit conflicted
though about whether to keep it as informational or consider historic.

In any case, as noted below, I'm more than happy to consider any text that
might improve these document by providing more information on opposing
viewpoints, etc.


   descibe these services in a much too friendly tone;
   terms like service and benefits for users are clearly
   abuse of language -- the above IAB statement already indicates

Sorry you feel that way.  Operators view these as services and describe
them as such, so I am simply using that language.  As I do my next pass
through the documents I will review it for any non-neutral descriptors. Of
course, also feel free to email me a list of the ones you think I should
consider revising in some manner.

   that similar interference with the DNS causes severe damage
   to user perception and performance.

The 2nd draft concerns protection from malware, which is generally assumed
to be a service that users opt-into (a la OpenDNS, etc.).  Those users who
have decided to use such services very likely are much more concerned with
malware than the fact that FQDNs associated with malware would be blocked.
 Again, I'm quite willing to include text you wish to propose to capture
alternative viewpoints and criticisms, as that's an important part of such
a document IMHO.

   These drafts should clearly spell out the downside of these
   methods and their fundamental nature, being MitM attacks.

I'm happy to consider any text you would like to propose, and am quite
willing to include specific notes that some in the community consider the
techniques MitM attacks, in order to try to capture all viewpoints on the
subject.  Feel free to send any proposed text to me via email.

Regards,
Jason

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Fisking vs Top-Posting

2010-09-24 Thread Tony Finch
On Fri, 24 Sep 2010, John C Klensin wrote:

 FWIW, the thing that really irritates me is having someone respond to a
 message after quoting only a few lines (often good) but without
 supplying some clue that permits me to find the message being replied to
 if needed.  [...] or even using a good In-reply-to field, [...]

Another example of Outlook's bad interoperability. I believe that there
was one release in which it implemented standard message threading, but
some bright spark decided to reinvent the wheel badly.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
HUMBER THAMES DOVER WIGHT PORTLAND: NORTH BACKING WEST OR NORTHWEST, 5 TO 7,
DECREASING 4 OR 5, OCCASIONALLY 6 LATER IN HUMBER AND THAMES. MODERATE OR
ROUGH. RAIN THEN FAIR. GOOD.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread Paul Hoffman
At 6:18 PM + 9/24/10, Livingood, Jason wrote:
I'm a bit conflicted
though about whether to keep it as informational or consider historic.

If it describes something that you believe is currently deployed, even if you 
think that deployment is non-optimal, it should be marked as Informational.

--Paul Hoffman, Director
--VPN Consortium
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread Keith Moore

On Sep 24, 2010, at 8:38 AM, Alfred HÎnes wrote:

 At Fri, 24 Sep 2010 07:21:21 -0400,  Michael Richardson wrote:
 
 Has the IETF (or rather then IAB) written any simple documents that
 explain to less informed (i.e. marketing/product) managers why it
 is a bad thing for a captive portal to spoof DNS replies?
 (not just in regard to DNSSEC, but also in regards to just caching)
 
 a) Most of the arguments explained in the 2003 IAB Commentary:
   Architectural Concerns on the use of DNS Wildcards,
   http://www.IAB.ORG/documents/docs/2003-09-20-dns-wildcards.html,
   apply in a similar fashion, but it indeed would be a good idea
   to produce such document.  I think much text from 2003 could
   be leveraged.

One important thing to realize is that this kind of service isn't always 
implemented using wildcards.  Sometimes the service is implemented using 
interception proxies.

 b) It should be clearly spelled out that this practice falls among the
   category of actions commonly known as man-in-the-middle attacks.

Agreed.  Actually, when a server or interception proxy deliberately 
misrepresents the contents of others' DNS zones, the appropriate term (IMO) is 
fraud.   

IANAL but would think that such practice should expose the operator of the 
server or proxy to civil and/or criminal action, both from the operators of the 
zones whose RRs are being misrepresented, and from the users' whose 
applications are affected.

 c) draft-livingood-dns-redirect and draft-livingood-dns-malwareprotect
   descibe these services in a much too friendly tone;

Strongly agree, at least for the -redirect draft.  At the very least, a 
distinction needs to be made between services which the individual user 
deliberately chooses, and services which are imposed without the users' 
knowledge or consent.  The draft also glosses over the problems created by this 
practice for all applications other than web browsing by human beings.   Not 
only does this provide misleading error indications for all other applications, 
it even breaks applications that are layered on top of HTTP.

 d) In my personal opinion, the original idea of having recursive
   DNS resolvers located close to the hosts should be given more
   traction again in the future.  All kinds of SOHO access gateways
   or home gateways should preferably offer (locally) full recursive
   and validating DNS resolution service.

Agree with this also.  In many cases the ideal model seems to be one in which 
the host serves as its own primary DNS server, or at least as the master DNS 
zone. 

Keith

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread John Levine
IANAL but would think that such practice should expose the operator
of the server or proxy to civil and/or criminal action, both from the
operators of the zones whose RRs are being misrepresented, and from
the users' whose applications are affected.

I'm not a lawyer either, but I at least know that fraud requires
intent.

If a naive user clicks on a link in spam, and the DNS cache intercepts
the request and returns a pointer to a warning page rather than a
Ukranian malware site, that's not fraud, that's a service.  If you
claim otherwise, people will look at you quizzically, like you're
spouting nonsense, which under the circumstances would be
understandable.  It also reinforces the perception that the IETF is
out of touch and hasn't noticed that it's no longer 1990.

Any analysis of DNS spoofing needs to take into account intentions and
tradeoffs.  On networks of consumer PCs, intercepting requests for
malware sites is a 100% win.  I'm not thrilled about the practice of
replacing NXDOMAIN with the A record of a page of links to lexically
similar web sites, but the actual harm of doing that on consumer
networks (not networks with servers) is pretty hard to show.
Replacing a valid record that isn't a pointer to malware with another
is indeed bad, but I don't know anyone who does that.

R's,
John

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread Steven Bellovin

On Sep 24, 2010, at 5:17 19PM, John Levine wrote:

 IANAL but would think that such practice should expose the operator
 of the server or proxy to civil and/or criminal action, both from the
 operators of the zones whose RRs are being misrepresented, and from
 the users' whose applications are affected.
 
 I'm not a lawyer either, but I at least know that fraud requires
 intent.
 
 If a naive user clicks on a link in spam, and the DNS cache intercepts
 the request and returns a pointer to a warning page rather than a
 Ukranian malware site, that's not fraud, that's a service.  If you
 claim otherwise, people will look at you quizzically, like you're
 spouting nonsense, which under the circumstances would be
 understandable.  It also reinforces the perception that the IETF is
 out of touch and hasn't noticed that it's no longer 1990.
 
 Any analysis of DNS spoofing needs to take into account intentions and
 tradeoffs.  On networks of consumer PCs, intercepting requests for
 malware sites is a 100% win.  I'm not thrilled about the practice of
 replacing NXDOMAIN with the A record of a page of links to lexically
 similar web sites, but the actual harm of doing that on consumer
 networks (not networks with servers) is pretty hard to show.
 Replacing a valid record that isn't a pointer to malware with another
 is indeed bad, but I don't know anyone who does that.

It will be interesting to see what will happen to these services when DNSSEC 
is used more widely.

Me -- VPNs are your friend; I use them to deflect all sorts of damage.

--Steve Bellovin, http://www.cs.columbia.edu/~smb





___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread John R. Levine

It will be interesting to see what will happen to these services when DNSSEC 
is used more widely.


Plan A: few consumers will use DNSSEC between their PCs and the ISP's 
resolver, so they won't notice.


Plan B: consumers will observe that malicious impersonation of far away 
DNS servers is rare and exotic, but malware spam arrives hourly, so they 
will make a rational tradeoff, take their ISP's advice, and turn off 
DNSSEC.


Malware that infects browsers and rewrites bank transactions on the fly is 
a huge problem, particularly in Europe, and requires no DNS funny business 
at all.  We can certainly imagine attacks that depend on DNS poisoning, 
but any tradeoff that makes it easier to get infected by malware is, for 
typical PC users, a foolish one.


Be careful what you ask for, and all that.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread John Levine
Plan A: few consumers will use DNSSEC between their PCs and the ISP's 
resolver, so they won't notice.

Plan B: consumers will observe that malicious impersonation of far away 
DNS servers is rare and exotic, but malware spam arrives hourly, so they 
will make a rational tradeoff, take their ISP's advice, and turn off 
DNSSEC.

Something else occurs to me:

Plan C: Sophisticated ISPs might configure their own DNSSEC key into
customer resolvers, and sign replacement records with that.

The threat model for DNSSEC has always been, approximately, that the
authoritative server at the far end is friendly, and the middleboxes
are hostile.  But we have real situtations where the opposite is true,
quite possibly more often than the other way around.

If we want people deploying DNSSEC widely, we need to make sure it
handles the actual threats they face.

R's,
John

PS: If I plug my random Windows PC or Mac into a cable modem, and I tell
it to use DNSSEC, where does it get the top level validation keys?
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-24 Thread bill manning

On 24September2010Friday, at 17:16, John Levine wrote:

 Plan A: few consumers will use DNSSEC between their PCs and the ISP's 
 resolver, so they won't notice.
 
 Plan B: consumers will observe that malicious impersonation of far away 
 DNS servers is rare and exotic, but malware spam arrives hourly, so they 
 will make a rational tradeoff, take their ISP's advice, and turn off 
 DNSSEC.
 
 Something else occurs to me:
 
 Plan C: Sophisticated ISPs might configure their own DNSSEC key into
 customer resolvers, and sign replacement records with that.
 
 The threat model for DNSSEC has always been, approximately, that the
 authoritative server at the far end is friendly, and the middleboxes
 are hostile.  But we have real situtations where the opposite is true,
 quite possibly more often than the other way around.

presuming your statement about an inversion of the stated trust model is 
correct,
can we dereference friendly and hostile to whom?  Who makes that assessment
and who/what defines the tools to implement a trust policy?


--bill


 
 If we want people deploying DNSSEC widely, we need to make sure it
 handles the actual threats they face.
 
 R's,
 John
 
 PS: If I plug my random Windows PC or Mac into a cable modem, and I tell
 it to use DNSSEC, where does it get the top level validation keys?
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Fisking vs Top-Posting

2010-09-24 Thread John C Klensin


--On Friday, September 24, 2010 08:17 -0700 Randy Dunlap
rdun...@xenotime.net wrote:

 One thing that bothers me is when people do mixed-line posting
 but end their reply say,  50% thru the message, but then they
 don't delete the rest of the message, so the reader has to scan
 the rest of the message to see if there are more comments.
 
 This saves time for the (one) sender and wastes time for N
 readers.

Again, if we all had consistent habits, many of these things
would be non-problems.  But we don't, and I don't know how to
fix that.

For that case in particular, I've sometimes done it
deliberately, but...

-- I always close/sign actual messages by typing my name, not
relying on some signature block.  So, if you see john or
--john, not immediately following by a p.s. or something
else with a forward pointer from the text above, I'm finished.

-- Given that, I sometimes leave additional text as context for
those who might need it, expecting that others will understand
that they don't need to read anything after the signature line.
Your comment suggests that expectation has been unreasonable.

john


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Fisking vs Top-Posting

2010-09-24 Thread Michael Richardson

 Tony == Tony Finch d...@dotat.at writes:
Tony On Fri, 24 Sep 2010, John C Klensin wrote:
 FWIW, the thing that really irritates me is having someone
 respond to a message after quoting only a few lines (often good)
 but without supplying some clue that permits me to find the
 message being replied to if needed.  [...] or even using a good
 In-reply-to field, [...]

Tony Another example of Outlook's bad interoperability. I believe
Tony that there was one release in which it implemented standard
Tony message threading, but some bright spark decided to reinvent
Tony the wheel badly.

Yes. And now we have 15 years of this bad behaviour.

My new financial planner had actually NEVER seen someone not top-quote, and
he actually thought his computer was broken, and couldn't figure out how
my text had moved.  I do not think he realizes that you can even edit
the quoted text.  He is less than 30, so literally, he has never used
anything else.

I've also been told that some organizations retain everything as audit.
(If they really wanted that, they should use message/rfc822, with an
embedded signature)

Such a nice social engineering hack on them to start CC'ing someone with
a made up history of some dispute, and claim it is true, alas, I've
never found a sufficiently interesting situation to bother trying it
out.

-- 
]   He who is tired of Weird Al is tired of life!   |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON|net architect[
] m...@sandelman.ottawa.on.ca http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video http://www.youtube.com/watch?v=kzx1ycLXQSE
   then sign the petition. 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


NomCom 2010-2011: List of Willing Nominees has been Updated

2010-09-24 Thread NomCom Chair
Hi Folks,

List of Willing Nominees has been updated:
--  
The second announced listing of willing nominees for the IETF open
positions is now available at
https://wiki.tools.ietf.org/group/nomcom/10/input/ 

In the past, such information was available only to a subset of the
community.  Now, for this NomCom, it is made available to everyone in the
community and it is easy to obtain. 

How to access the list:
---
To access the list (which is available to anyone), you will be asked to
login.  Any login you've used to subscribe to an IETF mailing list should
work here.  But if it doesn't, then you can easily obtain a
username/password from tools.ietf.org as follows:

Just select Get Passwd from the left margin and it will take you to the
new login page.  User name will be your email address and you can then
request a password at this page http://trac.tools.ietf.org/newlogin 

Who is listed? 
-- 
The names you see are only the nominees who have accepted a nomination for
one (or more) of the open IETF positions at this point in time.  Since the
Call for Nominations remains open until October 1, 2010, this list is
expected to grow.

Who is not listed? 
--
It is important to realize this list does not include the names of people
who have been nominated for a position and who either (a) have not
accepted a nomination or (b) may have accepted but have yet to be listed.
If you sent an acceptance more than 24 hours ago, and are not listed
please contact the NomCom chair. 

Additional Nominations needed:
--
More nominations are needed, particularly for most IESG open positions. 
Self nomination is welcome. Nominations remain open until October 1.  

Instructions on how to nominate someone for one or more of the IETF open
positions is found in the call for nominations at
https://datatracker.ietf.org/ann/nomcom/2468/ 

The list of open positions can be found at:
http://wiki.tools.ietf.org/group/nomcom/10/

Feedback:
-
The open list disclosure by this NomCom is to support the feedback
process.  NomCom can accept feedback at any time. Detailed instructions on
submitting feedback will be posted in a separate message. 

If you wish to provide anonymous feedback, the chair and any of the 
members will be happy to handle this for you.  The Nominating Committee 
chair can be reached at nomcom-ch...@ietf.org and the entire nominating 
committee can be reached at nomco...@ietf.org. The email addresses of 
individual NomCom members is also on the NomCom 2010-2011 pages a
https://wiki.tools.ietf.org/group/nomcom/10/ 

Thank you,

Thomas Walsh
Chair, NomCom 2010-2011
nomcom-ch...@ietf.org
twa...@juniper.net





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Second Last Call: draft-nottingham-http-link-header-10.txt (Web Linking) to Proposed Standard

2010-09-24 Thread The IESG

The IESG has received a request from an individual submitter to consider
the following document:
- 'Web Linking'
  draft-nottingham-http-link-header-10.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2010-10-08. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

The file can be obtained via
https://datatracker.ietf.org/doc/draft-nottingham-http-link-header/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-nottingham-http-link-header/

The purpose of this Second Last Call is to confirm some late changes to the 
IANA procedure/registry.
The following changes are proposed:

In Section 6.2 (Link Relation Type Registry), add the 2nd paragraph that 
reads:

   The underlying registry data (e.g., the XML file) must include
   Simplified BSD License text as described in Section 4.e of the Trust
   Legal Provisions (http://trustee.ietf.org/license-info).

In Section 6.2.1 (Registering New Link Relation Types), delete the following 
paragraph:

   When a registration request is successful, the Designated Expert(s)
   will update the registry XML file (using the format described in
   Appendix A including the MIT license) and send it to the
   link-relations-annou...@ietf.org mailing list (which SHOULD NOT be
   centrally archived, so as to avoid load issues from automated agents,
   and only accept posts from the Designated Expert(s)), so that
   implementers interested in receiving a machine-readable registry can
   do so.  Simultaneously, they will send a text (not XML) version of
   the registry to IANA for publication.

And finally, delete the whole Appendix A (together with A.1, which describes
the Relax NG grammar) which reads:

Appendix A.  Link Relation Registry Format

   To facilitate applications that wish to use registry data in an
   automated fashion, this specification defines an XML-based format for
   the registry entries.

   Each registered relation type is represented by a RelationType
   element, and if any of the app data values are other than the default
   value identified in the Application Data registry, they will be
   represented by appdata elements.

   Note that this format is NOT that in which IANA publishes the
   registry, because doing so would subject IANA's servers to,
   potentially, very high load (e.g., if Web browsers were to
   automatically update their copies of the registry).  Instead, this
   format is published to the link-relations-annou...@ietf.org mailing
   list, so that interested implementers can subscribe and distribute
   the machine-readable document using their own infrastructure.


No IPR declarations were found that appear related to this I-D.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6019 on BinaryTime: An Alternate Format for Representing Date and Time in ASN.1

2010-09-24 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6019

Title:  BinaryTime: An Alternate Format for 
Representing Date and Time in ASN.1 
Author: R. Housley
Status: Standards Track
Stream: IETF
Date:   September 2010
Mailbox:hous...@vigilsec.com
Pages:  6
Characters: 11394
Obsoletes:  RFC4049


URL:http://www.rfc-editor.org/rfc/rfc6019.txt

This document specifies a new ASN.1 type for representing time:
BinaryTime.  This document also specifies an alternate to the
signing-time attribute for use with the Cryptographic Message Syntax
(CMS) SignedData and AuthenticatedData content types; the
binary-signing-time attribute uses BinaryTime.  CMS and the
signing-time attribute are defined in RFC 5652.  [STANDARDS TRACK]

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce