Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread W.C.A. Wijngaards
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi John,

On 09/26/2010 04:34 AM, John R. Levine wrote:
 But we have real situtations where the opposite is true,
 quite possibly more often than the other way around.
 
 Not really.  There turn out to be a significant number of domains, in
 the hundreds of thousands at least, that are purely evil.  Some host

So, if DNSSEC is enabled with an end-host validator and the ISP cache
returns a different record for such a domain, the DNSSEC validator will
mark it as bogus and the user gets a serverfailure response.  The domain
cannot be accessed.  This is exactly right.

DNSSEC provides integrity checks, it does not synthesize the original
data out of thin air.  Thus, domains can be blocked.

 
 As I said in a previous message, I am not a big fan of rewriting
 NXDOMAIN, and I was on one of ICANN's advisory committees and helped

Showing an advert then, does not work.  Of course, showing an advert on
someone elses domain name is not particularly nice.

So, an ISP can provide a DNSSEC-enabled cache (that can validate as
well), and can block malware, and end-users can use that cache, and run
their own validator to secure the path to the ISP cache.  So, an
end-user can run a validator that is still a 'stub' that connects to the
ISP cache.  This is much more efficient too as the ISP cache has all the
data (and DNSSEC signatures) in its cache.

A remaining stumbling block (well, once the ISP runs a DNSSEC cache), is
the cablemodem-thingy, but it turns out these can (very often) be
circumvented by providing the validating-stub on the end-users machine
with the direct IP-address(es) of the ISP cache.

Best regards,
   Wouter
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkygTQYACgkQkDLqNwOhpPgbdACfbCRxW3Rii+MlFOUVeCl+HVRM
CJwAoLHbvFWyMSH+rf0wjuCcNR2jnz88
=JuT/
-END PGP SIGNATURE-
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Posting Placement (was Re: Fisking vs Top-Posting)

2010-09-27 Thread Olaf Kolkman



In the context of a long thread about style and readability[*] Joel M. Halpern 
summarized:

 
 I do want to re-iterate two points I have seen that are important.  Both are 
 relevant no matter what style of posting you like.
 1) People need to read the whole email before composing their response.  (You 
 can draft ideas while reading, but make sure you actually read the whole 
 thing before you finalise your response.)
 2) People need to edit longer threads so that they do not copy large amounts 
 of redundant and useless text.


I would think that there is a 3rd point: 
3) Think about what you would want to communicate, who to communicate to, and 
what style fits best. Fisking, classical Oxbridge rhetoric, top-posting, 
satire, acronyms (WFM, or 1+), one-liners, essays, YELLING, 
not-replying-at-all, c, c all seem to have their own effectivity and charm.

In that contest I observe that by looking at the  From:  header you can often 
predict the style that is used while in an ideal world you would like to see 
correlation with the Subject:  header.

--Olaf

[*] See for the whole thread: 
https://www.ietf.org/ibin/c5i?mid=6rid=49gid=0k1=933k2=53746tid=1285574931


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


IETF-meta (was: Fisking vs Top-Posting)

2010-09-27 Thread Richard L. Barnes

NEW NON-IETF LIST ANNOUNCEMENT

IETF Meta-Discussions

This group is dedicated to the discussion of ancillary issues of  
interest to the IETF community, especially discussions about how IETF  
discussions and meetings should work.
-- IETF meeting locations / travel 
-- Email composition design patterns 
-- Anything related to DiffServ politics


http://groups.google.com/group/ietf-meta






On Sep 20, 2010, at 2:20 PM, Phillip Hallam-Baker wrote:

One of the problems I have seen emerge on many IETF mailing lists is  
the habit of fisking.


By fisking I mean responding to a post  line by line *while reading  
it for the first time*.


Now sometimes a line by line response is entirely appropriate. If  
someone raises six different issues, you want to respond to each one  
separately. But other times I see posts of the following form:


 We should buy the red van

Are you crazy, the last three vans were yellow. Only an idiot would  
buy a red van (etc)


 Because even though yellow is traditional the red one is on sale  
for $1000 off.


I seem to be reading an increasing number of posts on various lists  
where it is very clear to me that the poster did not bother to read  
the entire message before starting their reply. In particular I have  
read rather a lot of people starting off by accusing their opponent  
of being ignorant of issues that their opponent actually states only  
a few paragraphs further on.



Traditionally, top-posting (or bottom posting) has been discouraged  
in favor of responding line by line. I think it is time to reverse  
that preference.


In particular I find that arguments are often less combative and  
somewhat shorter in mediums where people are forced to restate the  
issue they are objecting to in their own words.


--
Website: http://hallambaker.com/

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Phillip Hallam-Baker
The point raised by John Levine is amongst my concerns.

And one of the reasons that I have been looking at a different approach to
the use of DNSSEC information that does not change the DNS model as
radically as the end to end DNSSEC model.

The idea of using DNS resolver as a proxy is a good one in my view. The
problem with that model comes from the broken idea that a mobile host should
accept any DNS service offered via DHCP.

A DNS resolver is a trusted service, a host should not take just any DNS
resolver, it should choose a resolver and establish a secure connection to
it that at a minimum provides authentication but should ideally provide
confidentiality as well.

This is the case irregardless of whether DNSSEC is deployed or not. A DNS
resolver is a trusted intermediary even in the case that DNSSEC deployment
at servers is ubiquitous and clients are capable of DNSSEC end-to-end.


Once we have a model in which the DNS resolver relationship is trusted and
the communication to that resolver is secured, it is possible to use the DNS
resolver in much more interesting ways.

An end host can no more make sense of DNSSEC information on its own than a
single mail server can deal with spam effectively. A DNS resolver with
substantial throughput can collect the state data necessary to apply DNS
information intelligently.

DNSSEC is a mechanism for establishing inter-domain trust. It is not an
appropriate technology for intra-domain trust.


I do not want to connect my machines to every domain in the ICANN DNS
repository. And I certainly don't want ICANN to start restricting issue of
domains to people I or anyone else approves.

DNSSEC can tell my resolver what the authoritative DNS registry is. But that
resolver will then edit that registry to remove the domains that do not meet
my security criteria.

On Fri, Sep 24, 2010 at 8:16 PM, John Levine jo...@iecc.com wrote:

 Plan A: few consumers will use DNSSEC between their PCs and the ISP's
 resolver, so they won't notice.
 
 Plan B: consumers will observe that malicious impersonation of far away
 DNS servers is rare and exotic, but malware spam arrives hourly, so they
 will make a rational tradeoff, take their ISP's advice, and turn off
 DNSSEC.

 Something else occurs to me:

 Plan C: Sophisticated ISPs might configure their own DNSSEC key into
 customer resolvers, and sign replacement records with that.

 The threat model for DNSSEC has always been, approximately, that the
 authoritative server at the far end is friendly, and the middleboxes
 are hostile.  But we have real situtations where the opposite is true,
 quite possibly more often than the other way around.

 If we want people deploying DNSSEC widely, we need to make sure it
 handles the actual threats they face.

 R's,
 John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Phillip Hallam-Baker
That is not the right question.

The question should be, who chooses for me?

My answer to the question does not have to be the same as other people's.
Some people will want the full ICANN registry with every scammy malware site
and every DNS name registered five minutes ago. Others will prefer to have
only the ones proven safe.


If I was running a power station in the US, I would probably be quite happy
with a very short list indeed.

Gen Alexander is proposing a separate network for critical infrastructure. I
think that an edited DNS could play a very important role.


On Fri, Sep 24, 2010 at 9:10 PM, bill manning bmann...@isi.edu wrote:


 On 24September2010Friday, at 17:16, John Levine wrote:

  Plan A: few consumers will use DNSSEC between their PCs and the ISP's
  resolver, so they won't notice.
 
  Plan B: consumers will observe that malicious impersonation of far away
  DNS servers is rare and exotic, but malware spam arrives hourly, so they
  will make a rational tradeoff, take their ISP's advice, and turn off
  DNSSEC.
 
  Something else occurs to me:
 
  Plan C: Sophisticated ISPs might configure their own DNSSEC key into
  customer resolvers, and sign replacement records with that.
 
  The threat model for DNSSEC has always been, approximately, that the
  authoritative server at the far end is friendly, and the middleboxes
  are hostile.  But we have real situtations where the opposite is true,
  quite possibly more often than the other way around.

 presuming your statement about an inversion of the stated trust model is
 correct,
 can we dereference friendly and hostile to whom?  Who makes that
 assessment
 and who/what defines the tools to implement a trust policy?


 --bill


 
  If we want people deploying DNSSEC widely, we need to make sure it
  handles the actual threats they face.
 
  R's,
  John
 
  PS: If I plug my random Windows PC or Mac into a cable modem, and I tell
  it to use DNSSEC, where does it get the top level validation keys?
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www.ietf.org/mailman/listinfo/ietf

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf




-- 
Website: http://hallambaker.com/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread bmanning
 actually, it was the right questions... and the answers all distill 
down to your reply.  security and trust are in the eyes/validator
of the beholder.  Sam Weiler borrowed the term local policy - which
trumps any middleman.  Steve B. suggests VPNs (or their functioal 
eqivalant) between the authoritative or trusted source and the end-system
validator - where in this context, the validator/resolver is w/in a couple
usec of the application; e.g. in the same box.  

you can do it yourself or you can outsource it to someone else.  end of the
day, its the end-system operators choice. the tools for crisply defining 
the constrainsts of local policy are still very crude/fuzzy/undefined.

--bill


On Fri, Sep 24, 2010 at 10:16:05PM -0400, Phillip Hallam-Baker wrote:
 That is not the right question.
 
 The question should be, who chooses for me?
 
 My answer to the question does not have to be the same as other people's.
 Some people will want the full ICANN registry with every scammy malware site
 and every DNS name registered five minutes ago. Others will prefer to have
 only the ones proven safe.
 
 
 If I was running a power station in the US, I would probably be quite happy
 with a very short list indeed.
 
 Gen Alexander is proposing a separate network for critical infrastructure. I
 think that an edited DNS could play a very important role.
 
 
 On Fri, Sep 24, 2010 at 9:10 PM, bill manning bmann...@isi.edu wrote:
 
 
  On 24September2010Friday, at 17:16, John Levine wrote:
 
   Plan A: few consumers will use DNSSEC between their PCs and the ISP's
   resolver, so they won't notice.
  
   Plan B: consumers will observe that malicious impersonation of far away
   DNS servers is rare and exotic, but malware spam arrives hourly, so they
   will make a rational tradeoff, take their ISP's advice, and turn off
   DNSSEC.
  
   Something else occurs to me:
  
   Plan C: Sophisticated ISPs might configure their own DNSSEC key into
   customer resolvers, and sign replacement records with that.
  
   The threat model for DNSSEC has always been, approximately, that the
   authoritative server at the far end is friendly, and the middleboxes
   are hostile.  But we have real situtations where the opposite is true,
   quite possibly more often than the other way around.
 
  presuming your statement about an inversion of the stated trust model is
  correct,
  can we dereference friendly and hostile to whom?  Who makes that
  assessment
  and who/what defines the tools to implement a trust policy?
 
 
  --bill
 
 
  
   If we want people deploying DNSSEC widely, we need to make sure it
   handles the actual threats they face.
  
   R's,
   John
  
   PS: If I plug my random Windows PC or Mac into a cable modem, and I tell
   it to use DNSSEC, where does it get the top level validation keys?
   ___
   Ietf mailing list
   Ietf@ietf.org
   https://www.ietf.org/mailman/listinfo/ietf
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www.ietf.org/mailman/listinfo/ietf
 
 
 
 
 -- 
 Website: http://hallambaker.com/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Phillip Hallam-Baker
I don't see why DNSSEC makes dropping out zones impossible.

All DNSSEC does is to enable the end point to know that there is data
missing. It does not provide the end zone with any way to find the missing
data, nor is there any user interaction that makes any real sense in that
situation.

But the real answer to the problem is that the root zone signature is not
the root of trust for my DNS, it is the root of trust for the ICANN DNS.

myDNS = icannDNS - maliciousDNS


I plan to publish my root cert for my zone at the apex of my DNS zone and
establish that out-of-band as the trust anchor for every device and
application in my network.

Hosts in my network will determine that a secure DNS resolver is available
for the zone via the ESRV mechanism I recently proposed and establish a
secure tunnel with my DNS resolver via a protocol TBS, but probably based on
either the TLS handshake to establish a ticket containing all necessary
server-side state or the existing (but rather old and needing much revision)
TKEY mechanism and either TSIG or a cryptographic packaging mechanism TBS.

It would also be possible to adapt either DTLS or IPSEC. But neither of
those is well suited to use as a security wrapper for DNS for reasons I
won't go into here.


On Sun, Sep 26, 2010 at 12:26 PM, Tony Finch d...@dotat.at wrote:

 On 25 Sep 2010, at 01:16, John Levine jo...@iecc.com wrote
 
  Plan C: Sophisticated ISPs might configure their own DNSSEC key into
  customer resolvers, and sign replacement records with that.

 DNSSEC's validation model makes this basically impossible. The customer
 resolvers would have to know ahead of time which names will be overridden by
 their ISP and so may be validated by the extra trust anchor.

 Plan D: ISPs that want to block the DNS for evil domains just return a
 server failure response for the appropriate queries.

 See also Paul Vixie's RPZ proposal.

 Tony.
 --
 f.anthony.n.finch  d...@dotat.at  http://dotat.at/
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf




-- 
Website: http://hallambaker.com/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IETF-meta (was: Fisking vs Top-Posting)

2010-09-27 Thread Dave Cridland

On Mon Sep 27 15:37:56 2010, Richard L. Barnes wrote:
This group is dedicated to the discussion of ancillary issues of   
interest to the IETF community, especially discussions about how  
IETF  discussions and meetings should work.


Oh, I thought it was the technical rubbish that was off-topic here.

Dave.
--
Dave Cridland - mailto:d...@cridland.net - xmpp:d...@dave.cridland.net
 - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/
 - http://dave.cridland.net/
Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Tony Finch
On Fri, 24 Sep 2010, Phillip Hallam-Baker wrote:

 DNSSEC is a mechanism for establishing inter-domain trust. It is not an
 appropriate technology for intra-domain trust.

Why not?

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
HUMBER THAMES DOVER WIGHT PORTLAND: NORTH BACKING WEST OR NORTHWEST, 5 TO 7,
DECREASING 4 OR 5, OCCASIONALLY 6 LATER IN HUMBER AND THAMES. MODERATE OR
ROUGH. RAIN THEN FAIR. GOOD.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Roll] Last Call: draft-ietf-roll-rpl-11.txt IPR Concern

2010-09-27 Thread Cullen Jennings

I'm not closely involved with ROLL but I am working on devices using the CORE 
work that would likely make use of and depend on this protocol. I have some 
concerns about the practically of using ROLL given the IPR. My understanding of 
the IPR is that one would be required to use certificates that are from an CA 
license by Certicom. 

My belief is that the many of the low cost devices that would want to implement 
ROLL would be based on Linux implementation as that has become one of the most 
widely used operating systems for low cost networking devices such as 
residential routers. Given the optimal ways of integrating a protocol such as 
this into the kernel, and the issues of likening such as this in GPL code, I 
really wonder if the current IPR will be a major determent to deployment of 
ROLL. It's not easy to search the archives and I easily could have missed 
things but I can not find any significant discussion of it the WG could avoid 
this IPR. There were a few emails in July but it did not seem like it really 
hit this topic.  I would have expected to see discussion on such topics as 
David McGrews draft on Fundamental Elliptic Curve Cryptography Algorithms or 
perhaps using  RSA approaches.  I think discussion about this IPR, and ways it 
could be avoided, would be appropriate before approving this draft. 

Cullen 



On Aug 18, 2010, at 4:28 PM, The IESG wrote:

 
 The IESG has received a request from the Routing Over Low power and Lossy
 networks WG (roll) to consider the following document:
 - 'RPL: IPv6 Routing Protocol for Low power and Lossy Networks'
  draft-ietf-roll-rpl-11.txt as a Proposed Standard
 
 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2010-09-01. Exceptionally, comments may be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.
 
 The file can be obtained via
 https://datatracker.ietf.org/doc/draft-ietf-roll-rpl/
 
 IESG discussion can be tracked via
 https://datatracker.ietf.org/doc/draft-ietf-roll-rpl/
 
 
 The following IPR Declarations may be related to this I-D:
 
 /ipr/1270/
 /ipr/1356/
 /ipr/1366/
 ___
 Roll mailing list
 r...@ietf.org
 https://www.ietf.org/mailman/listinfo/roll


Cullen Jennings
For corporate legal information go to:
http://www.cisco.com/web/about/doing_business/legal/cri/index.html



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread bill manning

On 27September2010Monday, at 7:48, Tony Finch wrote:

 On Fri, 24 Sep 2010, Phillip Hallam-Baker wrote:
 
 DNSSEC is a mechanism for establishing inter-domain trust. It is not an
 appropriate technology for intra-domain trust.
 
 Why not?


Because the atomic unit of DNSSEC is a domain/zone/delegation, not a 
specific RRset.
Everything in a domain has the exact same threat model.

--bill

 
 Tony.
 -- 
 f.anthony.n.finch  d...@dotat.at  http://dotat.at/
 HUMBER THAMES DOVER WIGHT PORTLAND: NORTH BACKING WEST OR NORTHWEST, 5 TO 7,
 DECREASING 4 OR 5, OCCASIONALLY 6 LATER IN HUMBER AND THAMES. MODERATE OR
 ROUGH. RAIN THEN FAIR. GOOD.
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


IAOC Administrative Procedure Published

2010-09-27 Thread Bob Hinden
The IAOC approved it's updated administrative procedures on 16 September 2010.  
They can be found at:

  http://iaoc.ietf.org/docs/IAOC-Administrative-Procedures-9-16-2010.pdf

The change from what was discussed on this list was to add a requirement that 
any reimbursement of expenses to IAOC members for IAOC expenses will be 
reported in the minutes.

Bob Hinden
IAOC Chair

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


US DoD and IPv6

2010-09-27 Thread Noel Chiappa
So, I came across a interesting recent (June 24, 2010) article on the US
DoD's news site (http://www.defense.gov/news/), which quote Kris Strance,
the chief of internet protocol for the [Dod], as saying:

  {the DoD} philosophy is one that when a component has a mission need or a
  business case to move to IPv6, then they can do that ... It's driven by
  their need rather than an overall [Department of Defense] mandate.

(The complete article is at: 
http://www.defense.gov/news/newsarticle.aspx?id=59780

This seems a significant change in course from that given in the Internet
Protocol Version 6 (IPv6) Interim Transition Guidance of September 29, 2003,
which said that:

  the DoD has established the goal of transitioning all DoD networking to
  the next generation of the Internet Protocol, IPv6, by fiscal year (FY)
  2008.

The date slippage is not a big deal, I'm ignoring that. What is of more
interest is that it appears (from the news story) that there has been a
further* change of course on IPv6 adoption, from 'we _are_ going to
transition' to 'in cases where there is a monetary or operational case to
convert, it will happen, but otherwise not'.

Can anyone shed any light on this apparent change in policy?

Noel

-

* The only other policy course change I am aware of is the one from August
16, 2005 (Internet Protocol Version 6 (IPv6) Policy Update), which said
that:

  ... waiver submissions for programs not transitioning to IPv6 by FY2008.
  Henceforth, IPv6 waivers are not required by DoD CIO policy.

(The original September 29, 2003 policy had said If the IPv6 capable
criteria {for any DoD acquistion} cannot be met, a waiver will be required.)

I suppose that technically the seeming current course fits within that updated
policy, but it still seems to be a change in emphasis and direction.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: US DoD and IPv6

2010-09-27 Thread Marshall Eubanks

On Sep 27, 2010, at 7:31 PM, Noel Chiappa wrote:

 So, I came across a interesting recent (June 24, 2010) article on the US
 DoD's news site (http://www.defense.gov/news/), which quote Kris Strance,
 the chief of internet protocol for the [Dod], as saying:
 
  {the DoD} philosophy is one that when a component has a mission need or a
  business case to move to IPv6, then they can do that ... It's driven by
  their need rather than an overall [Department of Defense] mandate.
 
 (The complete article is at: 
 http://www.defense.gov/news/newsarticle.aspx?id=59780
 
 This seems a significant change in course from that given in the Internet
 Protocol Version 6 (IPv6) Interim Transition Guidance of September 29, 2003,
 which said that:
 
  the DoD has established the goal of transitioning all DoD networking to
  the next generation of the Internet Protocol, IPv6, by fiscal year (FY)
  2008.
 
 The date slippage is not a big deal, I'm ignoring that. What is of more
 interest is that it appears (from the news story) that there has been a
 further* change of course on IPv6 adoption, from 'we _are_ going to
 transition' to 'in cases where there is a monetary or operational case to
 convert, it will happen, but otherwise not'.

Does this surprise anyone with experience with the DOD ? It doesn't me.

Regards
Marshall 


 Can anyone shed any light on this apparent change in policy?
 
   Noel
 
 -
 
 * The only other policy course change I am aware of is the one from August
 16, 2005 (Internet Protocol Version 6 (IPv6) Policy Update), which said
 that:
 
  ... waiver submissions for programs not transitioning to IPv6 by FY2008.
  Henceforth, IPv6 waivers are not required by DoD CIO policy.
 
 (The original September 29, 2003 policy had said If the IPv6 capable
 criteria {for any DoD acquistion} cannot be met, a waiver will be required.)
 
 I suppose that technically the seeming current course fits within that updated
 policy, but it still seems to be a change in emphasis and direction.
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: US DoD and IPv6

2010-09-27 Thread Brian E Carpenter
On 2010-09-28 13:59, Marshall Eubanks wrote:
 On Sep 27, 2010, at 7:31 PM, Noel Chiappa wrote:
 
 So, I came across a interesting recent (June 24, 2010) article on the US
 DoD's news site (http://www.defense.gov/news/), which quote Kris Strance,
 the chief of internet protocol for the [Dod], as saying:

  {the DoD} philosophy is one that when a component has a mission need or a
  business case to move to IPv6, then they can do that ... It's driven by
  their need rather than an overall [Department of Defense] mandate.

 (The complete article is at: 
 http://www.defense.gov/news/newsarticle.aspx?id=59780

 This seems a significant change in course from that given in the Internet
 Protocol Version 6 (IPv6) Interim Transition Guidance of September 29, 2003,
 which said that:

  the DoD has established the goal of transitioning all DoD networking to
  the next generation of the Internet Protocol, IPv6, by fiscal year (FY)
  2008.

 The date slippage is not a big deal, I'm ignoring that. What is of more
 interest is that it appears (from the news story) that there has been a
 further* change of course on IPv6 adoption, from 'we _are_ going to
 transition' to 'in cases where there is a monetary or operational case to
 convert, it will happen, but otherwise not'.
 
 Does this surprise anyone with experience with the DOD ? It doesn't me.

It sound to me like a case for the phrase often used by my late colleague
Mervyn Hine at CERN, when the management performed a U-turn: Aha! Reality has
broken in again.

The fact is that official mandates are not a very good reason for
upgrading systems. Running out of a resource is a much better one.
http://www.potaroo.net/tools/ipv4/

   Brian

 
 Regards
 Marshall 
 
 
 Can anyone shed any light on this apparent change in policy?

  Noel

 -

 * The only other policy course change I am aware of is the one from August
 16, 2005 (Internet Protocol Version 6 (IPv6) Policy Update), which said
 that:

  ... waiver submissions for programs not transitioning to IPv6 by FY2008.
  Henceforth, IPv6 waivers are not required by DoD CIO policy.

 (The original September 29, 2003 policy had said If the IPv6 capable
 criteria {for any DoD acquistion} cannot be met, a waiver will be required.)

 I suppose that technically the seeming current course fits within that 
 updated
 policy, but it still seems to be a change in emphasis and direction.
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: US DoD and IPv6

2010-09-27 Thread Brian E Carpenter
Phill,

On 2010-09-28 16:25, Phillip Hallam-Baker wrote:
 The US DoD is running out of IPv4 space?

Where did I say that?

 
 I very much doubt it.

Maybe, maybe not... how would we know?

 
 Problem with the idea that resource depletion will drive adoption of IPv6 is
 that it ignores the fact that people who have plenty of IPv4 addresses may
 not be that worried about the inability of others to get hold of them.

Sure, and those people can live in their own little world, until
something changes. Then, they either have a plan in place, or they panic.

 And some people are going to see ways of keeping out the competition. Their
 view of IPv4 will like the view of the medallion owners who keep New York
 Taxis expensive and hard to find even though there is no shortage of drivers
 willing to work.

Yes, just as incumbent telcos fought against the Internet twenty years
ago, until something changed.

 The reason IPv6 is still at the project stage is that the designers had the
 wrong view of economics. You don't make IPv6 attractive by making it
 different to IPv4, you make it attractive by eliminating all the
 differences.

If only life was that simple, Phill. In any case, we can't rewrite history,
and many operators are well beyond project and well into plan.
Content providers who aren't into plan have a problem coming up if they
still want to grow their audience a few years from now.

   Brian

 
 
 On Mon, Sep 27, 2010 at 10:20 PM, Brian E Carpenter 
 brian.e.carpen...@gmail.com wrote:
 
 On 2010-09-28 13:59, Marshall Eubanks wrote:
 On Sep 27, 2010, at 7:31 PM, Noel Chiappa wrote:

 So, I came across a interesting recent (June 24, 2010) article on the US
 DoD's news site (http://www.defense.gov/news/), which quote Kris
 Strance,
 the chief of internet protocol for the [Dod], as saying:

  {the DoD} philosophy is one that when a component has a mission need
 or a
  business case to move to IPv6, then they can do that ... It's driven by
  their need rather than an overall [Department of Defense] mandate.

 (The complete article is at:
 http://www.defense.gov/news/newsarticle.aspx?id=59780
 This seems a significant change in course from that given in the
 Internet
 Protocol Version 6 (IPv6) Interim Transition Guidance of September 29,
 2003,
 which said that:

  the DoD has established the goal of transitioning all DoD networking
 to
  the next generation of the Internet Protocol, IPv6, by fiscal year (FY)
  2008.

 The date slippage is not a big deal, I'm ignoring that. What is of more
 interest is that it appears (from the news story) that there has been a
 further* change of course on IPv6 adoption, from 'we _are_ going to
 transition' to 'in cases where there is a monetary or operational case
 to
 convert, it will happen, but otherwise not'.
 Does this surprise anyone with experience with the DOD ? It doesn't me.
 It sound to me like a case for the phrase often used by my late colleague
 Mervyn Hine at CERN, when the management performed a U-turn: Aha! Reality
 has
 broken in again.

 The fact is that official mandates are not a very good reason for
 upgrading systems. Running out of a resource is a much better one.
 http://www.potaroo.net/tools/ipv4/

   Brian

 Regards
 Marshall


 Can anyone shed any light on this apparent change in policy?

  Noel

 -

 * The only other policy course change I am aware of is the one from
 August
 16, 2005 (Internet Protocol Version 6 (IPv6) Policy Update), which
 said
 that:

  ... waiver submissions for programs not transitioning to IPv6 by
 FY2008.
  Henceforth, IPv6 waivers are not required by DoD CIO policy.

 (The original September 29, 2003 policy had said If the IPv6 capable
 criteria {for any DoD acquistion} cannot be met, a waiver will be
 required.)
 I suppose that technically the seeming current course fits within that
 updated
 policy, but it still seems to be a change in emphasis and direction.
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

 
 
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: US DoD and IPv6

2010-09-27 Thread Ole Jacobsen

GOSIP

http://tools.ietf.org/html/rfc1039




Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Cisco Systems
Tel: +1 408-527-8972   Mobile: +1 415-370-4628
E-mail: o...@cisco.com  URL: http://www.cisco.com/ipj



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Media Type Registration Reviews - Standards Tree/No Internet Draft

2010-09-27 Thread IESG Secretary
The IESG has approved a request to register image/ktx MIME media types
in the standards tree. This media type is a product of the Khronos Group
(www.khronos.org). The IESG contact persons are Alexey Melnikov and
Peter Saint-Andre. The registration template can be found at this
location:

http://www.khronos.org/opengles/sdk/tools/KTX/file_format_spec/#mimeregistration
The original registration template was submitted as:
http://www.alvestrand.no/pipermail/ietf-types/attachments/20100831/df8a3724/attachment.txt


An archive of the discussion can be found here:

http://www.alvestrand.no/pipermail/ietf-types/2010-August/002385.html
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'Overview and Framework for Internationalized Email' to Informational RFC

2010-09-27 Thread The IESG
The IESG has approved the following document:
- 'Overview and Framework for Internationalized Email'
  draft-ietf-eai-frmwrk-4952bis-10.txt as an Informational RFC

This document is the product of the Email Address Internationalization
Working Group.

The IESG contact persons are Alexey Melnikov and Peter Saint-Andre.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-eai-frmwrk-4952bis/

Technical Summary

   Full use of electronic mail throughout the world requires that
   (subject to other constraints) people be able to use close
   variations on their own names (written correctly in their own
   languages and scripts) as mailbox names in email addresses.
   This document introduces a series of specifications that define
   mechanisms and protocol extensions needed to fully support
   internationalized email addresses.  These changes include an
   SMTP extension and extension of email header syntax to
   accommodate UTF-8 data.  The document set also includes
   discussion of key assumptions and issues in deploying fully
   internationalized email.  This document is an update of RFC
   4952; it reflects additional issues identified since that
   document was published.

Working Group Summary

   There were nothing controversal nor even rough for this document.

Document Quality

   This document does not describe any protocols in detail, that
   belongs to other documents.  Ernie Daindow, Tony Hansen,
   Shawn Steele, and Jiankang Yao reviewed the document
   thoroughly and suggested text to improve it. 

   The general protocol collection described in this document
   derives from prior Experimental protocols that were
   implemented and tested.  The results of those experiments,
   focusing on what should be done differently as a result, are
   discussed in this document.  At least those who implemented
   the Experimental protocols, and presumably some others, are
   likely to implement the standards-track protocols as soon as
   they are considered stable.  There appears to be significant
   worldwide demand for the facilities being specified by the
   EAI WG and outlined in this document.

Personnel

   Joseph Yee is the Document Shepherd. Alexey Melnikov is
   the Responsible Area Director.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'An Architecture for Network Management using NETCONF and YANG' to Informational RFC

2010-09-27 Thread The IESG
The IESG has approved the following document:

- 'An Architecture for Network Management using NETCONF and YANG '
   draft-ietf-netmod-arch-10.txt as an Informational RFC


This document is the product of the NETCONF Data Modeling Language Working 
Group. 

The IESG contact persons are Dan Romascanu and Ron Bonica.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-netmod-arch-10.txt

Technical Summary

   NETCONF gives access to native capabilities of the devices within a
   network, defining methods for manipulating configuration databases,
   retrieving operational data, and invoking specific operations.  YANG
   provides the means to define the content carried via NETCONF, both
   data and operations.  Using both technologies, standard modules can
   be defined to give interoperability and commonality to devices, while
   still allowing devices to express their unique capabilities.

   This document describes how NETCONF and YANG help build network
   management applications that meet the needs of network operators.

Working Group Summary

  This document represents strong consensus of the
  working group after intense work over the last 18 months.
  This document has been worked through very carefully
  by all key players in the working group.

Document Quality

  This document has been worked through very carefully
  by all key players in the working group.

Personnel

   David Partain is the Document Shepherd. Dan Romascanu is the
   Responsible Area Director.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


IAOC Administrative Procedure Published

2010-09-27 Thread The IAOC
The IAOC approved it's updated administrative procedures on 16 September
2010.  They can be found at:

   http://iaoc.ietf.org/docs/IAOC-Administrative-Procedures-9-16-2010.pdf


The change from what was discussed on the IETF list was to add a
requirement that any reimbursement of expenses to IAOC members for IAOC
expenses will be reported in the minutes.

Bob Hinden
IAOC Chair
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'PKCS #5 Password Based Key Derivation Function 2 (PBKDF2) Test Vectors' to Informational RFC

2010-09-27 Thread The IESG
The IESG has approved the following document:

- 'PKCS #5 Password Based Key Derivation Function 2 (PBKDF2) Test Vectors '
   draft-josefsson-pbkdf2-test-vectors-06.txt as an Informational RFC

This document has been reviewed in the IETF but is not the product of an
IETF Working Group. 

The IESG contact person is Sean Turner.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-josefsson-pbkdf2-test-vectors-06.txt

Technical Summary

   This document contains test vectors for the Public-Key Cryptography
   Standards (PKCS) #5 Password Based Key Derivation Function 2 (PBKDF2)
   with the Hash-based Message Authentication Code (HMAC) Secure Hash
   Algorithm (SHA-1) pseudorandom function.

Working Group Summary

   This is not the product of a WG. 

Document Quality

   There are at least four known implementations that confirmed these
   test vectors.

Personnel

   Simon Josefsson  si...@josefsson.org is the Document Shepherd.
   Sean Turner turn...@ieca.com is the sponsoring Area Director.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


[no subject]

2010-09-27 Thread The IESG
rfc-...@rfc-editor.org
Subject: Re: Experimental RFC to be: draft-dzis-nwg-nttdm-04.txt

The IESG has no problem with the publication of 'The Network Trouble
Ticket Data Model' draft-dzis-nwg-nttdm-04.txt as an Experimental RFC.

The IESG would also like the RFC-Editor to review the comments in 
the datatracker 
(https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=18533rfc_flag=0)
related to this document and determine whether or not they merit 
incorporation into the document. Comments may exist in both the ballot 
and the comment log. 

The IESG contact person is Peter Saint-Andre.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-dzis-nwg-nttdm-04.txt


The process for such documents is described at
http://www.rfc-editor.org/indsubs.html.

Thank you,

The IESG Secretary

Technical Summary

   This document defines an experimental XML format for communication
   of trouble tickets among network operation centers (NOCs).  This 
   format enables NOCs to automate the collection, communication,
   and synchronization of trouble tickets across multiple interconnected
   networks, such as those forming the Grid.  The model was 
   defined and used as part of the networking support activity of 
   the EGEE project (Enabling Grids for E-sciencE).

Working Group Summary

   This document is an independent submission and is not the product
   of (nor has it been reviewed by) any IETF working group.

Document Quality

   The document appears to accurately document the experimental XML 
   format in use.

Personnel

   The responsible Area Director is Peter Saint-Andre.

RFC Editor Note

   This specification documents an XML format that solves a problem
   similar to those addressed by the INCH and MARF working groups.
   However, the format serves a somewhat different purpose and thus
   the IESG has concluded that there is no conflict between this 
   document and IETF work.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: Experimental RFC to be: draft-dzis-nwg-nttdm-04.txt

2010-09-27 Thread The IESG
The IESG has no problem with the publication of 'The Network Trouble
Ticket Data Model' draft-dzis-nwg-nttdm-04.txt as an Experimental RFC.

The IESG would also like the RFC-Editor to review the comments in 
the datatracker 
(https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=18533rfc_flag=0)
related to this document and determine whether or not they merit 
incorporation into the document. Comments may exist in both the ballot 
and the comment log. 

The IESG contact person is Peter Saint-Andre.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-dzis-nwg-nttdm-04.txt


The process for such documents is described at
http://www.rfc-editor.org/indsubs.html.

Thank you,

The IESG Secretary

Technical Summary

   This document defines an experimental XML format for communication
   of trouble tickets among network operation centers (NOCs).  This 
   format enables NOCs to automate the collection, communication,
   and synchronization of trouble tickets across multiple interconnected
   networks, such as those forming the Grid.  The model was 
   defined and used as part of the networking support activity of 
   the EGEE project (Enabling Grids for E-sciencE).

Working Group Summary

   This document is an independent submission and is not the product
   of (nor has it been reviewed by) any IETF working group.

Document Quality

   The document appears to accurately document the experimental XML 
   format in use.

Personnel

   The responsible Area Director is Peter Saint-Andre.

RFC Editor Note

   This specification documents an XML format that solves a problem
   similar to those addressed by the INCH and MARF working groups.
   However, the format serves a somewhat different purpose and thus
   the IESG has concluded that there is no conflict between this 
   document and IETF work.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce