Re: RPS Accessibility

2013-08-06 Thread Brian Rosen
Could be an app that put you in the queue and used your
laptop/tablet/smartphone microphone to get the audio.

On Tuesday, August 6, 2013, Michael Richardson wrote:


 Dave Crocker d...@dcrocker.net javascript:; wrote:
  An entirely different approach would be to have all speakers make a
  'reservation' into a single meetecho (or whatever) online queue, and
 then get
  called in order, whether local or remote and independent of what
 microphone
  they are at.  This gets accurate identification into the online
 system, with
  the entry task distributed.

 +1.
 And move the microphones to the people, rather than the other way around.

 We can easily have three or four microphones that can play leap-frog around
 the room.

 --
 Michael Richardson mcr+i...@sandelman.ca javascript:;, Sandelman
 Software Works





Re: draft-housley-iesg-rfc3932bis and the optional/mandatory nature of IESG notes

2009-08-31 Thread Brian Rosen
Following a request to look at this document, and with only a cursory look
at the archives, I'm confused.

The note is always intended to be included in the document itself, right?

Is this change designed to compel, as opposed to request, the RFC Editor to
include the note?

If the answer to those is yes, then I support the change.  The RFC Editor is
not selected to make judgments on whether a note from the IESG should, or
should not be included in a document.  It's not an editorial judgment, it's
is a technical concern.

However, I think some form of appeal is needed, perhaps to the IAB, that
would allow authors some measure of control of what goes in their document.

Brian

 


On 8/31/09 9:29 AM, Jari Arkko jari.ar...@piuha.net wrote:

 I would like to get some further input from the community on this draft.
 
 But first some background. This draft was brought to a second last call
 in June because several IESG members felt uncomfortable with the IESG
 notes being used only in exceptional circumstances. I asked Russ to
 prepare the -07 version. This version allowed notes to be used at the
 IESG's discretion and suggested that the linkage (or lack thereof) to
 IETF work would typically be explained in the note. This version was
 taken to the second last call.
 
 While the number of comments we received was small, after the last call
 was over I determined that the consensus was against this change. As a
 result, I asked Russ to prepare the -08 version. This version goes back
 to the exceptional wording from -06, but incorporated a number of
 editorial corrections that had been made in interim. I also took the
 draft back to the IESG telechat last week. The IESG was not extremely
 pleased with the new version, but my understanding is that they were
 willing to accept the changes. However, a new issue was brought up: one
 of the changes that Russ and I felt was editorial highlighted the fact
 that the document makes the IESG notes a recommendation to the RFC
 Editor, not something that would automatically always be applied to the
 published RFC. Some IESG members were concerned about this, and
 preferred the latter.
 
 And now back to the input that I wanted to hear. I would like to get a
 sense from the list whether you prefer (a) that any exceptional IESG
 note is just a recommendation to the RFC Editor or (b) something that is
 always applied to the published RFC. Please reply before the next IESG
 meeting on September 10. Some e-mails on this topic have already been
 sent in the Last Call thread -- I have seen those and there is no need
 to resend.
 
 (For the record my own slight preference is b. But I have to say that I
 think the document has been ready to be shipped from version -06, and
 its unfortunate that we're not there yet, particularly since this
 document is holding up the implementation of the new headers and
 boilerplates system for independent submissions, IRTF submissions and
 IETF submissions. I will exhaust all possible means of getting this
 approved in the next meeting, as soon as I know what the community
 opinion is.)
 
 Jari Arkko
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: draft-housley-iesg-rfc3932bis and the optional/mandatory nature of IESG notes

2009-08-31 Thread Brian Rosen
Yes, I understand, this only applies to the Independent Submission stream.

We ask the IESG to review these documents, and that review is technical.

I don't think it is appropriate for an editor to make a judgment of whether
a technical note is, or is not appropriate to be included in a document.  I
think the presumption should be that it is appropriate, and the authors have
a way to object.  While I understand the role of the ISE is somewhat
different from the RFC Editor, I understand the role to be primarily
editorial and we are not choosing the ISE with regard to their ability to
make judgments like whether the IESG note is appropriate or not.

I think it would be okay to have the note go through an IETF consensus call.

Brian

On 8/31/09 11:25 AM, John C Klensin john-i...@jck.com wrote:

 
 Brian,
 
 Remember that 3932bis applies to the Independent Submission
 stream, not to IETF documents of any flavor.  These are, in
 general, documents that have not been formally reviewed in the
 IETF (although many of them have been extensively discussed).
 They are not IETF Stream documents, about which, subject to
 push-back from WGs and the community, the IESG can do pretty
 much as it likes.
 
 For these documents, there is no IETF Last Call.  If the IESG
 creates a note, that note reflects the individual judgments of
 the ADs (and presumably IESG review and approval of those
 judgments) and not the rough consensus of the IETF community.
 Given that, while it may be a technical concern (or at least
 reflective of a technical preference), it is a concern from (at
 most) a group of individuals who happen to be on the IESG; there
 is no requirement that it represent a technical concern from the
 IETF community.  
 
 In that context, what you are really asking for is that the
 preferences or concerns of that group of individuals --
 preferences that they could not get the RFC Editor or document
 authors to accept through normal review channels -- override the
 decision-making process and approval of a non-IETF stream.
 Especially since we expect documents in the Independent
 Submission stream that would carefully criticize or provide
 alternatives to IETF-approved approaches (see RFC 4846), giving
 the IESG that much authority, especially without consulting the
 IETF Community and determining consensus, does not seem sensible
 or consistent to me.  Indeed, it seems like a mechanism for
 permitting only authorized dissent.
 
 ...
 
 YMMD.
 
 john
 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Important Information about IETF 76 Meeting Registration

2009-08-31 Thread Brian Rosen
I like this thought quite a bit.

I see the RFID thing as being a good idea in concept, and we need to work
through how to use it most effectively.

In this specific case, I think we treat the tag as an identifier, and allow
the user to decide what the data associated with this identifier should be.

After all, you can write whatever you please on the blue sheets.

I personally would not have a problem if the name was immutable, but I could
see giving up on that.

Suppose there was a website where you could, either before, during, or after
the event, indicate, per session, what you want on the electronic blue
sheet.  The swipe was the token that enabled the content of the website data
to be copied.  Establish a time limit (5 days after the session maybe) to
freeze the content, do the mapping, and delete the website data.

Brian



On 8/31/09 12:56 PM, Steve Crocker st...@shinkuro.com wrote:

 I won't be in Hiroshima and won't be able to participate nor will I be
 able to opt-out, so I don't have a personal stake in this and am
 commenting only as an interested observer.
 
 As has been noted, this won't be an absolutely clean, seamless
 replacement of the blue sheets.  The list of possible downsides is
 already growing, e.g. privacy issues, inflexibility in choosing which
 email address to use for each working group, and I won't be surprised
 if the list grows a bit.  At the same time, the list of possible new
 capabilities is also growing, e.g. identifying the speaking at the
 microphone.
 
 This sort of discussion is similar to other settings that are
 introducing electronic versions of previously manual processes, e.g.
 in the health care industry.  Let me offer a point of view and a
 suggestion.
 
 Point of view: Rather than thinking of the RFID chips as serving to be
 simply a direct replacement of the blue sheets, take as a given that
 this will be a new and somewhat different technical foundation with
 some positives and some negatives.  The blue sheets also had positives
 and negatives, e.g. the cost and pain of storing them, the difficulty
 and cost of reading them, their legal status and retention policy,
 etc.  Look at the RFID chips from a fresh perspective, not solely as
 an automation of the blue sheets.
 
 Suggestion: As noted above, similar issues apply in other settings.
 This community has an opportunity to tackle the interplay of
 technology and social policy issues that affect itself far more
 cogently and efficiently than most communities do.  Let's grasp the
 nettles and see if we can work through the issues in a sensible and
 rational way.  Do we need a privacy policy regarding the information
 collected?  If so, let's create one.  Do we need access controls on
 the information?  If so, let's create them.  Do we need an ability to
 edit information that's been collected if it's inaccurate?  If so,
 let's build it.  Do we need more flexibility in the information stored
 in the record, e.g. a distinct email address for each working group?
 If so, let's add it.
 
 Steve
 
 
 
 
 
 
 
 On Aug 31, 2009, at 12:27 PM, Paul Hoffman wrote:
 
 At 5:55 AM -0700 8/31/09, Alexa Morris wrote:
 The data collected consist solely of an individuals full name and
 company/organization affiliation. We are not collecting email
 address information on the e-blue sheets.
 
 Please note that you are now also collecting information that *is
 not* on the current blue sheets, namely company/organization
 affiliation. I have noted that some people I know who have signed a
 blue sheet before me have used personal email addresses while (I
 assume) their badge lists their actual company/organization
 affiliation. As a person with multiple company/organization
 affiliations, I sometimes change the email address I put on the blue
 sheets to be the one most appropriate to the topic of the WG.
 
 It is a bad idea to have this experiment create combined blue sheets
 that have data that differs depending on the collection method.
 There are probably a dozen WGs in the IETF who have had this problem
 come back and bite them on their collective backsides during
 protocol development or, unfortunately, after their protocols have
 deployed.
 
 Please strongly consider having the readers record exactly what the
 current blue sheets record, or change the blue sheets to record what
 the readers are recording for this meeting. The first of these two
 will most likely cause less revolt.
 
 --Paul Hoffman, Director
 --VPN Consortium
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [XCON] Re: tsv-dir review of draft-ietf-xcon-bfcp-connection-04

2007-06-17 Thread Brian Rosen
Minor nit on the last part:
When the keys are randomly generated and of sufficient length,
these attacks do not obtain

obtain doesn't work.  Either do not succeed or generally do not
succeed or even usually fail.

Brian

 -Original Message-
 From: Gonzalo Camarillo [mailto:[EMAIL PROTECTED]
 Sent: Sunday, June 17, 2007 5:52 AM
 To: [EMAIL PROTECTED]
 Cc: Cullen Jennings; [EMAIL PROTECTED]; ietf@ietf.org; [EMAIL PROTECTED]
 Subject: [XCON] Re: tsv-dir review of draft-ietf-xcon-bfcp-connection-04
 
 Hi David,
 
 thanks for your comments. Answers inline:
 
 [EMAIL PROTECTED] wrote:
  I've reviewed this document as part of the transport area
  directorate's ongoing effort to review key IETF documents.
  These comments were written primarily for the transport
  area directors, but are copied to the document's authors
  for their information and to allow them to address any
  issues raised.
 
  This is a relatively straightforward draft about how a
  client opens a TCP connection to a BFCP server when it
  has the server's transport address information.
 
  Section 3 ventures into the area of IP address selection -
  it references RFC 3484 (which is good) and then goes on to
  make additional comments and recommendations on usage and
  state of deployment of the techniques specified in RFC 3484.
  While there's nothing technically wrong with this text, the
  additional comments and recommendations are not specific
  to BFCP, and may belong in a more generic document.
 
 Given that such a generic document does not exist, we need to give these
 recommendations here.
 
 
  Section 4 starts with All BFCP entities implement TLS ...
  That is correct, as RFC 4582 requires this, but it would be
  better to cite RFC 4582 as part of this statement, e.g.,
  [RFC 4582] requires that all BFCP entities implement TLS ...
 
 What about performing the following change?
 
 OLD:
 
 All BFCP entities implement TLS [7] and SHOULD use it in all their
 connections.
 
 NEW:
 
 [RFC 4582] requires that all BFCP entities implement TLS and recommends
 that they use it in all their connections.
 
 
  In the second paragraph of Section 4, I would change
  can request the use of TLS to SHOULD request the use
  of TLS.
 
 OK, I will fix it.
 
  Section 5.1 specifies that SubjectAltName identities in
  certificates are to be preferred to Subject identities.
  Is this specific to BFCP or more general?
 
 We got that recommendation from our security adviser. I do not know
 whether this will be documented in a generic document at some point.
 
  The following text appears to be an oversight:
 
 If the client knows the server's IP address, the iPAddress
 subjectAltName must be present in the certificate and must
 exactly match the IP address known to the client.
 
  The client *always* knows the server's IP address (e.g.,
  DNS returns it).  I think the intended case here is that
  the client contacts the server using the server's IP address
  and as a result does not know the server's hostname.  Rephrasing
  in that sort of fashion would also express a preference for
  hostname as certificate identity, which I believe is desirable.
 
 What about performing the following change?:
 
 OLD:
 If the client knows the server's IP address, the iPAddress
 subjectAltName must be present in the certificate and must exactly
 match the IP address known to the client.
 
 NEW:
 If the client does not know the server's hostname and contacts the
 server directly using the server's IP address, the iPAddress
 subjectAltName must be present in the certificate and must exactly
 match the IP address known to the client.
 
 
  Section 6 disturbingly shifts between password and
  pre-shared key and appears to get a few things wrong in
  the process.  To begin with, the statement that TLS PSK mode
  is subject to offline dictionary attacks. is false when
  the PSK is high-entropy.  OTOH, it is correct when the PSK
  is low-entropy (e.g., a password, or derived from a password
  without introduction of additional entropy).  The discussion
  in Section 7.2 of RFC 4279 applies, especially the last
  paragraph about PSK generation.  The section needs to be
  carefully revised to distinguish between password and
  pre-shared key, especially given the mention of use of
  PBKDF2 to generate the latter from the former.
 
 what about performing the following change?:
 
 OLD:
 
 TLS PSK mode is subject to offline dictionary attacks.  In DHE and
 RSA modes, an attacker who can mount a single man-in-the-middle
 attack on a client/server pair can then mount a dictionary attack on
 the password.  In modes without DHE or RSA, an attacker who can
 record communications between a client/server pair can mount a
 dictionary attack on the password.  Accordingly, it is RECOMMENDED
 that where possible clients use certificate-based server
 authentication ciphersuites with PSK in order to defend 

RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums

2007-04-25 Thread Brian Rosen
On most devices of interest, this is a non issue; they are small embedded
devices, like phones.

For other situations, for example a sip softclient running on a laptop, we
will specify an api on the O/S the application is running.  The api will
front end a set of Location Configuration Protocols of which DHCP is one.

Brian

 -Original Message-
 From: Hallam-Baker, Phillip [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, April 25, 2007 9:50 AM
 To: John Schnizlein; David W. Hankins
 Cc: GEOPRIV WG; ietf@ietf.org
 Subject: RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums
 
 But how does my application access it?
 
 DHCP is not something that an application layer program should be allowed
 to perform. It is a security issue. For good reason performing DHCP
 operations requires privileges beyond mere network connectivity on
 Windows.
 
 That is why configuring application programs from DHCP never caught on.
 
  -Original Message-
  From: John Schnizlein [mailto:[EMAIL PROTECTED]
  Sent: Sunday, April 22, 2007 6:41 PM
  To: David W. Hankins
  Cc: GEOPRIV WG; ietf@ietf.org
  Subject: Re: [Geopriv] Confirmation of GEOPRIV IETF 68
  Working Group Hums
 
  The reason that DHCP is appropriate for information about the
  location of the host is that the scope of DHCP administration
  usually does match the local network to which the host is
  attached.  Location is local information.
 
  John
 
  On Apr 20, 2007, at 3:38 PM, David W. Hankins wrote:
 
   The point is that the ISO L(x) is not what one considers
  when judging
   wether or not a certain configuration value would make a good band
   name.  I mean DHCP option.
  
   What we (strive to) consider instead is the administrative scope of
   the configuration information, and wether it matches common and
   practical use of DHCP.
 
 
  On Apr 19, 2007, at 7:47 PM, David W. Hankins wrote:
   On Thu, Apr 19, 2007 at 03:38:40PM -0700, Hallam-Baker,
  Phillip wrote:
   DHCP is a layer 3 technology that talks directly to layer 2.
  
   DHCP is a technology that dynamically configures hosts.
  
   If a host has a configuration knob that might reasonably
  and properly
   be set by the systems administrator or the network you are
  presently
   attached to, then it is reasonable and proper to configure it via
   DHCP.
 
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums

2007-04-25 Thread Brian Rosen
Sorry, bad choice of words. 

I'm not sure, but almost certainly not IETF.  IETF doesn't do apis.  I'm
trying to get MS+Apple+Linux and maybe some embedded OS folks to agree to
have a common api.  I don't know if that will work yet.

Brian

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, April 25, 2007 4:31 PM
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]; ietf@ietf.org
 Subject: RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums
 
 Brian,
 
 we will specify an api on the O/S the application is running
 
 Who is we, geopriv?
 
 Guy Caron
 -Message d'origine-
 De : Brian Rosen [mailto:[EMAIL PROTECTED]
 Envoyé : 25 avril 2007 14:29
 À : 'Hallam-Baker, Phillip'; 'John Schnizlein'; 'David W. Hankins'
 Cc : 'GEOPRIV WG'; ietf@ietf.org
 Objet : RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums
 
 On most devices of interest, this is a non issue; they are small embedded
 devices, like phones.
 
 For other situations, for example a sip softclient running on a laptop, we
 will specify an api on the O/S the application is running.  The api will
 front end a set of Location Configuration Protocols of which DHCP is
 one.
 
 Brian
 
  -Original Message-
  From: Hallam-Baker, Phillip [mailto:[EMAIL PROTECTED]
  Sent: Wednesday, April 25, 2007 9:50 AM
  To: John Schnizlein; David W. Hankins
  Cc: GEOPRIV WG; ietf@ietf.org
  Subject: RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group
 Hums
 
  But how does my application access it?
 
  DHCP is not something that an application layer program should be
 allowed
  to perform. It is a security issue. For good reason performing DHCP
  operations requires privileges beyond mere network connectivity on
  Windows.
 
  That is why configuring application programs from DHCP never caught on.
 
   -Original Message-
   From: John Schnizlein [mailto:[EMAIL PROTECTED]
   Sent: Sunday, April 22, 2007 6:41 PM
   To: David W. Hankins
   Cc: GEOPRIV WG; ietf@ietf.org
   Subject: Re: [Geopriv] Confirmation of GEOPRIV IETF 68
   Working Group Hums
  
   The reason that DHCP is appropriate for information about the
   location of the host is that the scope of DHCP administration
   usually does match the local network to which the host is
   attached.  Location is local information.
  
   John
  
   On Apr 20, 2007, at 3:38 PM, David W. Hankins wrote:
  
The point is that the ISO L(x) is not what one considers
   when judging
wether or not a certain configuration value would make a good band
name.  I mean DHCP option.
   
What we (strive to) consider instead is the administrative scope of
the configuration information, and wether it matches common and
practical use of DHCP.
  
  
   On Apr 19, 2007, at 7:47 PM, David W. Hankins wrote:
On Thu, Apr 19, 2007 at 03:38:40PM -0700, Hallam-Baker,
   Phillip wrote:
DHCP is a layer 3 technology that talks directly to layer 2.
   
DHCP is a technology that dynamically configures hosts.
   
If a host has a configuration knob that might reasonably
   and properly
be set by the systems administrator or the network you are
   presently
attached to, then it is reasonable and proper to configure it via
DHCP.
  
  
   ___
   Ietf mailing list
   Ietf@ietf.org
   https://www1.ietf.org/mailman/listinfo/ietf
  
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 
 
 ___
 Geopriv mailing list
 [EMAIL PROTECTED]
 https://www1.ietf.org/mailman/listinfo/geopriv


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums

2007-04-20 Thread Brian Rosen
Agree that 3825 doesn't have the ability to express uncertainty and
confidence.  I don't wish to enhance it to do so at this time.

However, a triangulated WiFi location may have sufficiently low uncertainty
that it could be used for many purposes, including emergency calling,
without reporting what the actual uncertainty was.

In order to actually be useful if the endpoint was mobile, the endpoint
would have to implement a location update, since only it can requery DHCP to
get a new location.  The device that does the triangulation may not be
connected to the DHCP infrastructure.  In these circumstances, HELD may be a
better choice

Also, the most common initial deployments of WiFi will be that the clients
of an AP are given the location of the AP they are connected to as their
location, and that will often be civic.  RFC4776 would work well there.  I
expect that will be a very common deployment model.

Brian

 -Original Message-
 From: Dawson, Martin [mailto:[EMAIL PROTECTED]
 Sent: Friday, April 20, 2007 9:03 AM
 To: Brian E Carpenter; Hannes Tschofenig
 Cc: Brian Rosen; GEOPRIV WG; ietf@ietf.org; Allison Mankin; John
 Schnizlein
 Subject: RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums
 
 3825 can actually only represent uncertainty to the extent that it can
 be conveyed by precision. This makes it unsuitable for the sort of
 arbitrary uncertainty around arbitrary location values you refer to.
 
 Cheers,
 Martin
 
 -Original Message-
 From: Brian E Carpenter [mailto:[EMAIL PROTECTED]
 Sent: Friday, 20 April 2007 10:59 PM
 To: Hannes Tschofenig
 Cc: Brian Rosen; 'GEOPRIV WG'; Dawson, Martin; ietf@ietf.org; 'Allison
 Mankin'; 'John Schnizlein'
 Subject: Re: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group
 Hums
 
 On 2007-04-20 09:21, Hannes Tschofenig wrote:
  DHCP is not a great choice in a mobile environment and also not when
 it
  comes to more complex location representations.
 
 Why can't a mobile system have a locally valid DHCP record (+/- the
 length
 of a wireless link)? For that matter, why couldn't a DHCP server have
 real-time triangulation data, if it exists at all?
 
 Do you mean more complex than can be expressed by RFC 4776 and RFC 3825
 together?
 
  Brian
 
 --
 --
 This message is for the designated recipient only and may
 contain privileged, proprietary, or otherwise private information.
 If you have received it in error, please notify the sender
 immediately and delete the original.  Any unauthorized use of
 this email is prohibited.
 --
 --
 [mf2]


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums

2007-04-20 Thread Brian Rosen
The cable systems use the MAC address of the DOCSIS modem to determine which
subscriber is asking for location.  It's not perfect, because it is possible
to move a DOCSIS cablemodem from one house to another within some area
(often the service area of the CMTS, but in many systems, less than that).
The ability to move without detection is a problem the have for other
revenue sources and there is some effort being put into systems to detect
that kind of thing.  The incidence of moving the cablemodem without notice
is apparently very small.

You don't get the location of the server, you get the location of the
client.

Brian

 -Original Message-
 From: Michael Thomas [mailto:[EMAIL PROTECTED]
 Sent: Friday, April 20, 2007 9:39 AM
 To: Brian E Carpenter
 Cc: 'GEOPRIV WG'; 'Dawson,Martin'; ietf@ietf.org; 'Allison Mankin'; 'John
 Schnizlein'
 Subject: Re: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums
 
 Brian E Carpenter wrote:
  On 2007-04-20 09:21, Hannes Tschofenig wrote:
  DHCP is not a great choice in a mobile environment and also not when
  it comes to more complex location representations.
 
  Why can't a mobile system have a locally valid DHCP record (+/- the
  length
  of a wireless link)? For that matter, why couldn't a DHCP server have
  real-time triangulation data, if it exists at all?
 
  Do you mean more complex than can be expressed by RFC 4776 and RFC
  3825 together?
 If you look at DOCSIS cable, a single head end can subtend a huge amount
 of cable in a single bridged domain. I seem to recall that in a rural
 Canadian
 MSO I worked with it was 10's if not 100's of miles. I have no clue how
 accurate GEOPRIV tries to be, but it sure seems that if the location of
 the
 headend/dhcp relay is only piece of information you have, your accuracy is
 going to be pretty lousy in many cases. If this information is intended
 for
 first responders, it seems that all you're doing is pointing to the
 right haystack
 to start searching for the needle.
 
Mike, who probably shouldn't open his mouth here
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums

2007-04-20 Thread Brian Rosen
Yup.

There are no mechanisms that work when the Pringles cans come out other than
actual endpoint measuring mechanisms (like GPS), which have their own
limitations.  The standards recommend methods for users to override the
automatic mechanisms when they do things like Pringle can extensions.  There
are a set of security issues on THAT, but it's still a workable notion.

The Cablelabs guys and individual MSOs have looked at this, and most believe
they can deploy a DHCP based location infrastructure that works pretty well.
The pretty part is mostly the problem of cablemodem moving.  Nothing is
perfect, nor does it need to be.  I think it's good enough, although I'd
really like them to be advancing on detecting cablemodem moves.  At least
that error source is a deliberate user action which is really already
prohibited by contract.

This whole area is complex because there isn't anything that works always.
There have to be options, both for access network operators, device
manufacturers and even end users to deal with all the variations in reality
that occur.

And again, nothing is going to be perfect.

Brian



 -Original Message-
 From: Michael Thomas [mailto:[EMAIL PROTECTED]
 Sent: Friday, April 20, 2007 10:14 AM
 To: Brian Rosen
 Cc: 'Brian E Carpenter'; 'GEOPRIV WG'; 'Dawson,Martin'; ietf@ietf.org;
 'Allison Mankin'; 'John Schnizlein'
 Subject: Re: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums
 
 Brian Rosen wrote:
  The cable systems use the MAC address of the DOCSIS modem to determine
 which
  subscriber is asking for location.  It's not perfect, because it is
 possible
  to move a DOCSIS cablemodem from one house to another within some area
  (often the service area of the CMTS, but in many systems, less than
 that).
  The ability to move without detection is a problem the have for other
  revenue sources and there is some effort being put into systems to
 detect
  that kind of thing.  The incidence of moving the cablemodem without
 notice
  is apparently very small.
 
  You don't get the location of the server, you get the location of the
  client.
 
 
 That's only because there's an out of band arrangement with the MSO
 and the subscriber. DHCP itself gives no such information. Wireless
 substantially confuses the matter too. All it takes is two Pringle's cans
 to cast that relationship in doubt.
 
Mike
  Brian
 
 
  -Original Message-
  From: Michael Thomas [mailto:[EMAIL PROTECTED]
  Sent: Friday, April 20, 2007 9:39 AM
  To: Brian E Carpenter
  Cc: 'GEOPRIV WG'; 'Dawson,Martin'; ietf@ietf.org; 'Allison Mankin';
 'John
  Schnizlein'
  Subject: Re: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group
 Hums
 
  Brian E Carpenter wrote:
 
  On 2007-04-20 09:21, Hannes Tschofenig wrote:
 
  DHCP is not a great choice in a mobile environment and also not when
  it comes to more complex location representations.
 
  Why can't a mobile system have a locally valid DHCP record (+/- the
  length
  of a wireless link)? For that matter, why couldn't a DHCP server have
  real-time triangulation data, if it exists at all?
 
  Do you mean more complex than can be expressed by RFC 4776 and RFC
  3825 together?
 
  If you look at DOCSIS cable, a single head end can subtend a huge
 amount
  of cable in a single bridged domain. I seem to recall that in a rural
  Canadian
  MSO I worked with it was 10's if not 100's of miles. I have no clue how
  accurate GEOPRIV tries to be, but it sure seems that if the location of
  the
  headend/dhcp relay is only piece of information you have, your accuracy
 is
  going to be pretty lousy in many cases. If this information is intended
  for
  first responders, it seems that all you're doing is pointing to the
  right haystack
  to start searching for the needle.
 
 Mike, who probably shouldn't open his mouth here
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums

2007-04-19 Thread Brian Rosen
In the example you gave the Hilton is EXACTLY the network that MUST give you
your location, and Verisign, if they tried, would give a valid, but very
wrong location.

That is the point of using DHCP for location, you need the closest possible
server to get the right location.  You need a server that understands the L2
to which you are connected.  Anything L3 and farther has a big problem of
where, exactly, are you?  The proposals for L7 versions of location
configuration protocols suffer mightily from the problem of figuring out
where you are in the L2.  They have to go to great lengths to determine some
kind of identifier that they can unambiguously use to figure that out.  I
think we have (painfully) figured out a way though that morass that will
work in enough circumstances to be interesting, but it remains hard, very
hard, to identify the L2 when your server is sitting at L7.

So, make sure that when you go to the Hilton that you use it's location
server, or you may have a big problem if you have to make an emergency call
(or even order a pizza).

DHCP is an excellent choice for a location server for networks where the
DHCP infrastructure is present, and can reasonably be upgraded.  The L7 guys
point out, correctly, that that's a tall order in a lot of interesting
networks.  I think that is right.  I do think they believe L7 works on every
network.  I'm certain it doesn't.  

That's why the compromise of BOTH is probably required.  I know it's the
only way we are going to get anything done in the next year.

Brian

 -Original Message-
 From: Hallam-Baker, Phillip [mailto:[EMAIL PROTECTED]
 Sent: Thursday, April 19, 2007 6:39 PM
 To: James M. Polk; Dawson, Martin; John Schnizlein; Andrew Newton
 Cc: GEOPRIV WG; ietf@ietf.org; Allison Mankin
 Subject: RE: [Geopriv] Confirmation of GEOPRIV IETF 68 Working Group Hums
 
 DHCP is a layer 3 technology that talks directly to layer 2.
 
 This is entirely acceptable, useful and right for NETWORK configuration.
 DHCP is an entirely sensible means of obtaining an IP address and
 _proposals_ for domain name prefixes and DNS servers.
 
 DHCP should not be used for any other purpose. In particular to make use
 of DHCP for application configuration is a layer violation. Layer 7 should
 NEVER communicate with Layer 2 directly. When that happens we lose all the
 power and flexibility built into the IP stack.
 
 
 To give a concrete example of the problems caused. I am currently typing
 on a VeriSign machine in an office in VeriSign corporate HQ. In that
 environment the local DHCP server could provide me with useful and valid
 suggestions for all manner of services. But its still the wrong
 technology.
 
 The problem is that when I take the machine to the Hilton Garden Inn down
 the road where I am staying I explicitly DO NOT want the hotel network to
 provide any more than an IP address. I am not going to use their DNS
 server and I certainly don't want to make use of any email server, DNS
 prefix, GEOPRV or any other application layer feature they might want to
 foist onto me.
 
 I am using the Hilton Garden Inn LAN, I am not joining their network. The
 machine is remaining on the VeriSign network.
 
 
 DHCP is a fine technology for the task DHCP is designed to do. It is an
 inappropriate technology for application or service configuration. The
 proper infrastructure to support those needs is DNS, supplemented if
 necessary by HTTP or LDAP backing store (i.e. either discover the services
 via DNS directly or use DNS to discover where the directory service is to
 be found).
 
 Looking at the history of UPnP and Zero Config it strikes me that
 attempting to manage networks through peer to peer broadcast or multicast
 have been a bust precisely because of this layer violation.
 
 
  -Original Message-
  From: James M. Polk [mailto:[EMAIL PROTECTED]
  Sent: Thursday, April 19, 2007 5:31 PM
  To: Dawson, Martin; John Schnizlein; Andrew Newton
  Cc: GEOPRIV WG; ietf@ietf.org; Allison Mankin
  Subject: RE: [Geopriv] Confirmation of GEOPRIV IETF 68
  Working Group Hums
 
  At 04:20 PM 4/19/2007, Dawson, Martin wrote:
  DHCP is not adequate because it doesn't meet multiple sets of
  requirements as documented multiple times ...
 
  bologna
 
  documented multiple times means in individual submissions
 
  of which, zero facts were presented to substantiate
 
  If DHCP were so inadequate, why is the DSL forum now going to
  specify it? Why does PacketCable define it?  These were
  fairly recent moves...
 
  And, how many times has HELD been presented as if it were a
  product of an IETF WG?
 
  James
 
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www1.ietf.org/mailman/listinfo/ietf
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org

RE: IM and Presence history

2006-11-29 Thread Brian Rosen
 However, what this subthread demonstrates is
 that they were conceptually an incremental change, not a giant,
 discontinuous, intellectual leap.
 
 I thought we all knew that.
Oh, I agree, we knew that.   There are very, very few discontinuous
intellectual leaps in our part of the universe.  It's hard to name one that
happened in the past decade or two.

Can we name any discontinuous intellectual leaps of late in computer
networking?  Now that I think about it, forget of late, have there EVER
been any?


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IM and Presence history

2006-11-28 Thread Brian Rosen
If you squint hard enough, everything has already been invented.  Telegraph
operators had a form of presence if you squint hard enough.

Presence is a continuously updated 'display' of a set of other people's
status.  Finger didn't do that.  Yeah, you COULD have used the mechanism to
implement a form of presence, but I don't remember anyone ever doing that,
and if they did, it didn't make anyone sit up and take notice like the IM
folk's buddy status systems did.  They invented presence, as we know it, and
of course it's not entirely new, but then again, little else is.

Finger had antecedents in various time sharing systems versions of who is
logged in mechanisms.  They in turn had predecessors in various user id
logging mechanisms on batch systems.  I recall being able to determine who
was in the CMU Comp Center by looking at a fairly often posted list of batch
runs made for the 1108, and the G20 graphics systems certainly had
mechanisms to know who was on the other displays way before I got there.

Sending real time messages to users logged in is almost as old.  The G20
graphics systems had such facilities.  Every time sharing system did, and of
course, the telegraph operators had a similar facility.  They aren't IM.

Brian

 -Original Message-
 From: Dave Crocker [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, November 28, 2006 11:01 AM
 To: John C Klensin
 Cc: ietf@ietf.org
 Subject: Re: IM and Presence history
 
 
 
 John C Klensin wrote:
  Yes.  I wanted to keep the note from becoming even longer, but...
 
 ack.  figured that, but found myself compelled that the history lesson was
 useful for the record.
 
 
  If I came in through an arpanet dial-up at some random place
  on the net, and telneted to my home system, then the finger
  for that home system would show me as 'present'.  I am not
  seeing how today's presence systems are fudamentally different
  from that.
 
  Subjectively and from my perspective, the present systems
  feel, and sometimes actually are, much more distributed.  But,
  yes, from the perspective you describe, we have advanced very
  little in terms of basic functionality.
 
 
 I believe that none of the proprietary IMs is anything other than purely
 centralized.
 
 Having to configure multiple IM accounts, to be able to talk to different
 people, doesn't feel at all 'distributed' to me, except in the bad sense
 of
 multiple, disconnected, centralized services.
 
 d/
 
 --
 
Dave Crocker
Brandenburg InternetWorking
bbiw.net
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Meetings in other regions

2006-07-25 Thread Brian Rosen
It may have changed, but when Marconi sponsored an IETF, the budget was
about $250K for the network, terminal room, help desk, hospitality desk,
t-shirts and the difference between expense and receipts for the social
(hint: most socials cost more than the $25-30 that is charged).  No
equipment was bought (it was all borrowed from Marconi or other sponsors).
I think we went over the budget.  I am told most non U.S. meeting
sponsorship costs are significantly higher, but I have no direct knowledge.

You don't give the IETF any money, you just pay the costs detailed above.
The IETF doesn't really tell you that you have to do any of the above.
Everything really is optional, but most sponsors follow the established
pattern.  

For U.S. locations, the sponsor is not involved directly with the venue, the
hotels, A-V or other direct meeting support beyond the network; the
secretariat handles it all.

You don't see many companies rushing to spend hundreds of thousands of
dollars to sponsor an IETF.   There really isn't any glory, and lots of
potential grief.  

Brian

 -Original Message-
 From: Iljitsch van Beijnum [mailto:[EMAIL PROTECTED]
 Sent: Monday, July 24, 2006 4:20 PM
 To: Joel Jaeggli
 Cc: ietf@ietf.org; [EMAIL PROTECTED]
 Subject: Re: Meetings in other regions
 
 On 24-jul-2006, at 16:28, Joel Jaeggli wrote:
 
  IETF should look for global sponsors, in a given time frame, for
  example
  for a year, or just a meeting if needed, but as said *decoupled*
  from the
  venue.
 
  Local sponsors can take care of the social, breaks, etc.
 
  As you know Jordi local sponsors have historically been invaluable in
  getting access to local resources, like network connectivity and
  handling the logistics of network setup.
 
  having local support is always better than not having it.
 
 
 
 I think Jordi brings up a good point, today sponsors are supposed
 to cough up a lot of cash AND do a lot of work. Presumably, it would
 be easier to find people with cash and people willing to volunteer
 work separately rather than insist on a package deal.
 
 Also, it's unclear how much sponsoring an IETF meeting is supposed to
 cost in actual cash. The documentation doesn't talk about cash, only
 about facilities. I'm pretty sure I can arrange for facilities such
 as bandwidth, network operations/terminal room staffing and maybe
 even a social event for free or nearly free by having different
 organizations sponsor each, but if I could come up with the money to
 pay market price for this stuff then I wouldn't be on this list but
 I'd be paying someone else to be on it. So is the quarter million
 figure that I saw floating by in my inbox supposed to cover the
 published host duties, or is this in _addition_ to taking care of
 these duties?
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Flaw in the NOTEWell System makes NOTEWELL NOTWELL

2006-07-25 Thread Brian Rosen
I've actually been successful at arguing something like the opposite of
this.

Many corporations now assert this silly little hunk of text at the end of
every message claiming the email is private and such.  A typical one is:

  This message and any attachments to it may contain PROPRIETARY AND
  CONFIDENTIAL INFORMATION exclusively for intended recipients. Please DO 
  NOT FORWARD OR DISTRIBUTE to anyone else. If you are not the 
  intended recipient, please contact the sender and delete all copies 
  of this e-mail from your system. 

This is in direct violation of Note Well, which requires all documents,
including email to not contain proprietary or confidential information.
Further, since the email is sent to the IETF, which has a well established
policy of publicly posting all email sent to it, I have argued that unless
this warning is removed, it renders the admonition ineffective for the cases
it is wanted, since the sender obviously knows that what he is sending is
not confidential, is instantly forwarded, is immediately made public and to
claim otherwise means the sender is not actually serious about defending
truly private IP.  Several lawyers have agreed, and forced the corporation
to allow removal of the postscript when sending to public lists, much to the
consternation of the IT folks who thought implementation of the IP notice
was simple.

Since complying with IETF IP policy is a condition of participation, and no
one is forced to participate, corporations can claim ownership, but cannot
claim confidentiality.  

I also chuckle at the delete all copies of this email part.  Most
corporations routinely backup inboxes, making this impossible for the
non-intended recipient to comply.  I always compare this to the Hollywood
stars who will not answer a call without incoming CallerId, and always block
outgoing CallerId.

Do note that even post SOX, the notice on the email typically does not claim
ownership.  Every company I know claims ownership of everything on their
systems, which would include, presumably, all incoming mail.  So you always
have the dueling claims to fight over.

Brian

 -Original Message-
 From: todd glassey [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, July 25, 2006 6:44 PM
 To: ietf@ietf.org
 Subject: Flaw in the NOTEWell System makes NOTEWELL NOTWELL
 
 Hi there Audit Fans - Lets look at NoteWell and figure out how it
 interacts
 with Corporate Governance and Compliance Policies...
 
 let me make a couple of observations:
 
 NOTEWELL http://www.ietf.org/NOTEWELL.html has some hidden requirements
 that
 make it broken. Let me illustrate...
 
 1) All the major players who sponsor people in the IETF have an
 iron-clad email policy which EVERYONE is aware of that says that they OWN
 the IP emanating from their Email System. This is generally not negotiable
 here in the US either. This means that they WILL NOT allow any releases
 against IP sent from their Email Systems or Domain. The cannot - lest they
 lose the control they have over the internal use of the servers which
 might
 seem fun to this group - but its something that NO EXECUTIVE is going to
 allow.
 
 2) The IETF however claims that any Email sent to it in any form
 constitutes NOTEWELL and becomes its property. The problem is that it has
 no
 agreements with the other email provider to make that true.
 
 3) The IETF also tries to protect itself by requiring the Individual
 to
 represent that they have formal authorization to participate in the IETF
 through the Entity's resources, except that there is the issue of #1 which
 NO entity in its right mind would consider relaxing...
 
 So who actually owns the IP?
 
 Better yet - can ANY SOX constrained company with public controls in place
 on its internal services allow an Employee or Guest to use their
 infrastructure to participate in a process that directly violates their
 corporate operating guidelines?
 
 ???
 
 Todd
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: What's an experiment?

2006-02-15 Thread Brian Rosen
I believe if the community does not have confidence that the protocol will
actually work on the Internet, then we are experimenting.  I think this
definition would cover a number of protocols we would now consider for
Proposed Standard (rather than Informational), and pushes us back towards
Running Code.

A protocol that has no implementations and is significantly new and
different that we cannot inspect the document to have confidence it will
work as intended would be Experimental.   This is both a complexity and an
exposition test as well as a measure of how similar a protocol is to other
protocols we know work as intended.

I think that when an author, or an entire work group, dreams up a
significant new protocol and brings forth a complex document with no code,
then we have a research and development effort underway, which should be
allowed to complete; that is, test it.  We have a product (a real standard),
when we show that our research worked.  As with most research and
experimentation, it is not necessary to have market acceptance to have a
successful research project.  It is nice, and a good indicator that the
protocol works.

Brian

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Brian E Carpenter
Sent: Wednesday, February 15, 2006 10:07 AM
To: IETF discussion list
Subject: What's an experiment?

When considering some recent appeals, the IESG discovered that
we have very little guidance about the meaning of experiments
in relation to Experimental RFCs. RFC 2026 refers to work which
is part of some research or development effort and the IESG
has adopted some guidelines to discriminate between Experimental
and Informational documents (see
http://www.ietf.org/u/ietfchair/draft-iesg-info-exp-01.html ).
But beyond that, we do not know what constitutes an acceptable
experiment on the Internet.

The IESG notes that the community could establish a variety of
guidelines describing what is and is not acceptable in experiments.
Historically, the IESG has made decisions based on its perception
that there is a strong desire in the community to publish technology
that is being deployed experimentally.  We encourage community discussion
and development of more specific guidelines on operational conflicts
caused by experiments and how this should affect what we choose to
publish.  (However we recommend that such discussion
focus on the general issue rather than the specifics of any case.)

   Brian Carpenter
   for the IESG




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-10 Thread Brian Rosen
It's trivial for a human, but not for a computer.
Many things trivial for humans are not trivial for computers.

The kind of harvesting you are talking about is trivial for a human from any
format as long as your editor can paste while losing formatting.

What we are seeing is increasing use of fully automated tools that don't
have humans identifying which octets are MIB and which are code.  You can't
do that with plain ASCII.

Your statement that the IETF is getting populated with people who don't code
is true.  It's a fact, and we need to adapt.  Most (but not all) of the
people who design protocols these days don't code; they have people who work
with them who do.  Part of that is unavoidable.  The part I regret, which
could be avoided, is the loss of running code that we used to care about.
Another thread.

Brian

-Original Message-
From: Theodore Ts'o [mailto:[EMAIL PROTECTED] 
Sent: Monday, January 09, 2006 11:37 PM
To: Brian Rosen
Cc: [EMAIL PROTECTED]; 'John C Klensin'; 'Marshall Eubanks'; ietf@ietf.org
Subject: Re: Alternative formats for IDs

On Sat, Jan 07, 2006 at 03:18:08PM -0500, Brian Rosen wrote:
 Any format can be used for any purpose, but it might be time to fully
stand
 up to requirements to harvest data, and to recognize (as I did on another
 side thread), that reading is getting harder and harder for ASCII.  It may
 be a decent archive format still, but I'm not sure it's going to stay that
 way.

Huh?  Harvesting data from ASCII, in terms of pulling out MIB's to
be fed into MIB compiler, or reference C code for algorithms like MD5
(RFC 1321) is *trivial* under ASCII.  Last I checked, C compilers and
MIB compilers still use ASCII text as input, and not Word documents or
XML documents.  Maybe part of what is going on is that IETF is getting
populated with people who aren't close to coding as much as before?
You can get perfectly decent text editors for all operating systems,
even Windows.

And even Word can import text (i.e., plain ASCII) documents Just Fine.

- Ted



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-10 Thread Brian Rosen
Ted

You are arguing that we have been producing documents for a long time with
only primitive tools and we don't need to make any new tools.  You are
losing that argument.   We are increasing the number, and usefulness of
tools, and most of us appreciate these tools and want more of them.  The
range of useful tools we can produce is related to how much meta-data we put
in the source files.  The more meta-data we put in, the more usefulness we
can get out of the data.  There is very little downside to adding meta-data
as long as it's easy to put in.  For most of these things, we have to do
special formatting, so we are already marking the octets in some way.  

Do you have any idea how painful it is to build any kind of product that has
good management simply because there is no library of MIBs, with references
to documents?  There isn't even a LIST of IETF MIBs.  You can't figure out
if a document has a MIB unless you actually look at the text (although many
have a big hint in the title of the document).  So yes, I believe better MIB
tools would lead to better products, although it would be hard to prove it.

I would like to enable automated testing of ABNF.  I'd like to be able to
cross check the ABNF from one document against its normative references to
see what changes or conflicts.  I'd like to be able to generate a complete
list of SIP error messages a UA may be expected to encounter.  I'd like to
see a lot more hyperlinking of things.  All of these are much easier with
meta-data.

Brian


-Original Message-
From: Theodore Ts'o [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, January 10, 2006 8:58 AM
To: Brian Rosen
Cc: [EMAIL PROTECTED]; 'John C Klensin'; 'Marshall Eubanks'; ietf@ietf.org
Subject: Re: Alternative formats for IDs

On Tue, Jan 10, 2006 at 08:09:10AM -0500, Brian Rosen wrote:
 It's trivial for a human, but not for a computer.
 Many things trivial for humans are not trivial for computers.
 
 The kind of harvesting you are talking about is trivial for a human from
any
 format as long as your editor can paste while losing formatting.
 
 What we are seeing is increasing use of fully automated tools that don't
 have humans identifying which octets are MIB and which are code.  You
can't
 do that with plain ASCII.

True.  So what?  Do you think that it is possible, or even a good
idea, that tools be able to rip out a MIB without reading the rest of
the text?  If so, why the heck do we spend so much time working on a
the human-readable sections, like Security Considerations?

And how much time does it really save to have an automated tool pull
out the MIB, instead of having a human do it?  And what percentage of
the effort does that represent out of the effort to create a product,
anyway?  0.0001%   0.1%?   

I can usually do it in under a minute with some emacs macros, but I'm
willing to admit that I may be a bit better at it than others.  Other
people could probably do it in a few minutes using sed and awk, or
even (gasp) perl.

- Ted



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-10 Thread Brian Rosen
sorry, couldn't help it
You mean, like xml?


-Original Message-
From: Brian E Carpenter [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, January 10, 2006 8:53 AM
To: [EMAIL PROTECTED]
Cc: ietf@ietf.org
Subject: Re: Alternative formats for IDs

...
 What we are seeing is increasing use of fully automated tools that don't
 have humans identifying which octets are MIB and which are code.  You
can't
 do that with plain ASCII.

You can do that with meta-data encoded in plain ASCII. In fact, that
would work better for automated extraction than anything visual such as
using multiple fonts.

code.../code

 Brian




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-10 Thread Brian Rosen
I'd mostly agree if this was a one off, but it's not; it requires continuous
effort to maintain.  My experience that manual is usually cheapest if it
only has to be done once, and automation is cheapest if it has to be
continuously maintained.  YMMV.

Most of the harvesting of sections of things that are now text that could be
harvested apply to RFCs and not IDs, but things like ABNF checking and even
MIB checking could be part of ID nits.  Hyperlinks apply to both.

There are many ways to put meta-data in files, but I'd rather not invent a
new one.  xml is just fine, thank you.  And we have a nice tool that puts
out text and html, and with a small amount of effort, PDF from xml.  Our
reluctance to use it is mostly:
The RFC editor has some problems which have not, to my knowledge,
beenenumerated.

There are currently other ways to produce ASCII output that people
are
reluctant to give up on.

I suspect we can fix the former.  The question is whether the usefulness of
the harvesting and alternative outputs outweighs the latter, assuming we
accept ASCII output as required and normative.

Brian


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Paul
Hoffman
Sent: Tuesday, January 10, 2006 11:15 AM
To: ietf@ietf.org
Subject: RE: Alternative formats for IDs

At 9:45 AM -0500 1/10/06, Brian Rosen wrote:
Do you have any idea how painful it is to build any kind of product that
has
good management simply because there is no library of MIBs, with references
to documents?  There isn't even a LIST of IETF MIBs.  You can't figure out
if a document has a MIB unless you actually look at the text (although many
have a big hint in the title of the document).  So yes, I believe better
MIB
tools would lead to better products, although it would be hard to prove it.

Why does this need to be done in the RFCs or Internet Drafts 
themselves? Why, for example, can't a human with a bit of training 
extract all the MIBs from the current RFCs and put them into a 
repository that is machine-accessible? Doing so would probably take 
less time than writing the tool to make human-readable RFCs also 
machine-readable.

As for Internet Drafts (if we really want people implementing from 
Internet Drafts), it is trivial to create a convention that says if 
you want the MIB in your draft to be machine-readable, copy the MIB 
to a public web server and, in the draft, put on a line by itself: 
THE-MIB-IS-AT url. No changes are needed to any input or output 
tools, yet the problem of finding MIBs is solved.

I would like to enable automated testing of ABNF.  I'd like to be able to
cross check the ABNF from one document against its normative references to
see what changes or conflicts.  I'd like to be able to generate a complete
list of SIP error messages a UA may be expected to encounter.  I'd like to
see a lot more hyperlinking of things.  All of these are much easier with
meta-data.

Sure. If any of those features came free or very cheap, that would be 
great. None of them do, particularly when you factor in the 
design-by-entire-IETF-mailing-list work factor. Instead, a bit of 
human interaction is much less expensive.

--Paul Hoffman, Director
--VPN Consortium

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-07 Thread Brian Rosen
So, the problem you are citing is the issue that you want to harvest data
out of the ID or RFC.  That's common now, and getting more common.  You then
immediately move to say ASCII is the right output format because it makes
harvesting the data you want easy.

Well, probably not as easy as publishing the ID/RFC in some way that is
designed to make harvesting of the data within it easy.  Say, xml (2629 and
follow ons).

I believe this issue has been raised before, but we have three uses for the
ID and RFC files: we read them, we harvest data from them and we archive
them (RFCs anyway) for later use.

Any format can be used for any purpose, but it might be time to fully stand
up to requirements to harvest data, and to recognize (as I did on another
side thread), that reading is getting harder and harder for ASCII.  It may
be a decent archive format still, but I'm not sure it's going to stay that
way.

Of course, if you have three different uses, and you end up with more than
one format to satisfy all of your requirements, then you have the
normative problem.  I really think some of you wave that particular flag a
bit too strongly, but I think that most of us would be okay with publishing
in multiple formats, including ASCII (for now), and even with saying that
the ASCII text is the normative one, if and when there is any difference
that matters between the formats.

I think publishing the xml for harvesting really is the best thing we can
do.  If we do, we may want some more work done to make more harvesting
possible.  The schema now is really organized around readability.  This
probably has less to do with defining new tags than in using some metadata
to mark things like ABNF, code, MIBs and the like.  

I am a proponent of PDF output format; I find it very useful for reading.  I
have had very few problems with PDF, fewer than with ASCII these days.  I am
also pretty pleased with HTML as the current tool (xml2rfc) creates. 

That would mean the the I-D editor and the RFC editor uses xml2rfc, we
publish the xml, the ASCII and possibly PDF and/or html from the xml.  If
you want, the ASCII can be normative.  That also implies the desired input
format is xml.  We can discuss if we want the RFC editor to accept something
else and bear the burden of converting to xml.

I've heard the RFC editor has tried using xml and xml2rfc and is not
satisfied with the results as far as creating ASCII versions of RFC text.
It would be interesting to hear what problems they have seen.

Brian

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
David B Harrington
Sent: Saturday, January 07, 2006 9:33 AM
To: 'John C Klensin'; 'Marshall Eubanks'
Cc: ietf@ietf.org
Subject: RE: Alternative formats for IDs

Hi,

As a MIB Doctor and chair of the Bridge WG, I have been working with
the IEEE 802.1 WG, who will assume maintenance responsiblities for the
Bridge WG Mib modules.

IEEE 802.1 publishes their standards in PDF. We had to make a special
request that they make the MIB portion of their documents available in
ASCII format, partly so, as part of the transition process, IETF MIB
Doctors could review their documents (e.g., running the MIB module
through smilint and other compilers), but also so the MIB modules
could be extracted for importing into network management applications,
such as NET-SNMP and HP OvenView.

A similar issue will exist for documents that contain code snippets.

While I personally like PDF for many things, I find PDF to be a poor
choice for IETF works-in-progress, or even for RFCs because they lack
many of the characteristics that ASCII files offer.

David Harrington
[EMAIL PROTECTED]

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of John C Klensin
 Sent: Monday, January 02, 2006 3:37 PM
 To: Marshall Eubanks
 Cc: ietf@ietf.org
 Subject: Re: Alternative formats for IDs
 
 Marshall,
 
 --On Monday, 02 January, 2006 16:03 -0500 Marshall Eubanks
 [EMAIL PROTECTED] wrote:
 
 ...
The project, currently referred to as PDF/A, will address
  the  growing need to electronically
  archive documents in a way that will ensure preservation of
  their  contents over an extended period of
  time, and will further ensure that those documents will be
  able to be  retrieved and rendered with a
   ^^
  consistent and predictable result in the future.  This need
  exists in  a growing number of international
  government and industry segments, including legal systems,
  libraries,  newspapers, regulated industries, and others.
  
The work will address the use of PDF for multi-page
  documents that  may contain a mixture of
  text, raster images and vector graphics.  It will also address
  the  features and requirements that must be
  supported by reading devices that will be used to retrieve and
  render  the archived documents.
   ^^
 
 Emphasis added, of course.
 
 As I have understood it, PDF/A is 

RE: objection to proposed change to consensus

2006-01-06 Thread Brian Rosen
This

On the other hand, it does appear that the availability of ASCII
support as a common denominator is decreasing over time.  As has been
observed, some software vendors seem to go out of their way to make
simple ASCII hard to use.  So there is increasing pressure to find
a (truly) better solution.

This is the nut of the output representation problem for me.

Most people who object to changing the output format talk about ASCII as if
it always was the standard, and always will be the standard.  If we were
having this discussion 30 or 35 years ago, we would be discussing whether
ASCII would take over EBCDIC or not.  35 years ago, it would not be clear
that ASCII would survive.  There was a holy war about that.  ASCII did in
fact take over from EBCDIC, but it wasn't always clear that it would.

As Bob points out, we are, in fact, coming to the end of the line for ASCII.
It's not in trouble this year, except that it's pretty damn tough to print
it satisfactorily on the machines most of us have to work with.  I suspect
it will get increasingly difficult to create and edit in the not too distant
future.  That would make it a possible minimum common denominator archive
format, but not a useful reading format.

It's probably true that we can push this problem off another year, but maybe
not, and definitely not for very much longer.

Brian  



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Why have we gotten away from running code?

2005-08-06 Thread Brian Rosen
I notice that we have stopped being interested in running code.

I think that is to our community's detriment.

If two groups are arguing with one another, and one has implemented code and
the other has not, I think we would give great weight to the running code.
I don't see that happening.  This happened in a session during this meeting
where I was present.  Running code was not considered significant in the
discussion; it was not even mentioned as a criterion in deciding the issue.

Probably more importantly, I think we should be VERY suspicious of new,
complex specifications before we have running code.  We are very clearly NOT
doing this.  We are willing to publish a proposed standard for an entirely
new protocol that has very significant complexity, where there are people
openly skeptical that it will work at all, with nothing but some sketchy
simulations and a (admittedly well reviewed) draft.  We are routinely
publishing complex protocols and significant changes/additions without even
simulations.

Our rules permit us to do such things.  We should rarely choose to.  We
don't know what we are getting into until we write code.  We don't know how
hard it is to implement, we don't know what works and what doesn't.

Perhaps there are a large number of you out there that are able to claim
reasonably complex things work based on reading a document and looking at
simulations.  I am not.  My experience is that getting something to actually
do what you want it to do is very illuminating.

I wonder if we should change our bias towards bestowing Experimental status
on drafts that ask to be published as RFCs without running code.

Clearly, there are specifications where the complexity is low, and we have
enough experience with the subject that we can be reasonably sure it works
without running code.  We should be able to bring such ideas out at Proposed
Standard.  Good judgment is always required to choose which side of a line a
particular draft falls on.  I assert we have pushed the line away from
running code quite too far.

We still do operate with rough consensus.  We ought to return to having
running code.

Brian



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: calendar file for IETF

2005-07-25 Thread Brian Rosen
So, I just had to try it, even though my company insists on MS Exchange for
calendars.  Of course it didn't work, and I never expected it to work.
However, the error message is at least amusing:

  This error can appear if you have attempted to save a recurring 
  Lunar appointment in iCalendar format.
  To avoid this error, set the appointment option to Gregorian instead of
  Lunar.

Brian

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Eliot Lear
Sent: Saturday, July 23, 2005 4:35 AM
To: Cyrus Daboo; IETF Discussion
Cc: Eliot Lear
Subject: Re: calendar file for IETF

An additional update reflecting yesterdays changes is now available at
http://www.ofcourseimright.com/~lear/ietf63.ics.

Additional stuff:

 - UIDs *should* be stable across changes.
 - An attempt has been made to make proper use of SEQUENCE
 - An attempt has been made to parse out LOCATION information
 - Garbage in/Garbage out problem repaired.
 - Several bad dates have been corrected.

Usual cautions apply.  This calendar file could blow up any tool it is
applied to.  But it didn't blow up iCal, at least.

Eliot

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Last Call: 'Labels in Subject Headers Considered Ineffective At Best' to Informational RFC

2005-02-24 Thread Brian Rosen
I read the first draft of this document, and wondered:
Does this propose to change IETF behavior on list management, so that the
name of the list (usually same as working group) is not put in the Subject:
using the feature of mailman that does this?

When it was just a draft, it was just speculation.

Now that the IESG is considering this draft, I want to ask:
Is that what you have in mind?

I think having the IETF list traffic have the solicitation class keyword
marked appropriately is a good idea.

I think having every email program on the planet become capable of filtering
on this keyword is a good idea.

I think having every email program on the planet become capable of
displaying this field when it is not empty has some value, but I'm not sure
what the tradeoffs are when the display is small, as on a PDA or mobile
phone.

However, until we get the latter two accomplished, I want the list manager
to mark the Subject: with the name of the list.

I don't know about you, but what I have today (very popular email program
from a gigantic company and very cool cellphone/PDA combo thingy that works
pretty darn nice for email) WILL NOT WORK WELL FOR ME if Subject is not
marked.  One does not have filters, and does not have a way to display an
arbitrary header field.  One has filters, but I don't see a filter mechanism
for Solicitation Class, and I don't see that key word in the fields I can
display, although there appears to be a way to define your own field so
maybe that would work.  Dunno, but unless it works at least as well as
marking Subject, I don't want to get rid of that feature.

So, I ask that the author of the draft state his intentions with respect to
IETF list management, and that such an intention form part of the
consideration of the IETF on what to do with the draft.

Brian

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:ietf-announce-
 [EMAIL PROTECTED] On Behalf Of The IESG
 Sent: Tuesday, February 22, 2005 9:35 AM
 To: IETF-Announce
 Subject: Last Call: 'Labels in Subject Headers Considered Ineffective At
 Best' to Informational RFC
 
 The IESG has received a request from an individual submitter to consider
 the
 following document:
 
 - 'Labels in Subject Headers Considered Ineffective At Best '
draft-malamud-subject-line-02.txt as an Informational RFC
 
 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action.  Please send any comments to the
 iesg@ietf.org or ietf@ietf.org mailing lists by 2005-03-22.
 
 The file can be obtained via
 http://www.ietf.org/internet-drafts/draft-malamud-subject-line-02.txt
 
 
 ___
 IETF-Announce mailing list
 IETF-Announce@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf-announce
 




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: New Last Call: 'Tags for Identifying Languages' to BCP

2004-12-18 Thread Brian Rosen
I don't have any comment on the issue of language tags, but speaking as a
reasonably avid ABNF hacker, I agree with Sam, and would not want to
establish a convention that ABNF in IETF RFCs is expected to be precise.
One MUST read the text to understand what the limits of the syntax are.
This is especially true with repetitions.  It's usually tortuous to write
ABNF that limits repetitions or string lengths.  It's possible, but the
result is very hard to understand.

Brian

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Sam Hartman
 Sent: Saturday, December 18, 2004 1:55 PM
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: Re: New Last Call: 'Tags for Identifying Languages' to BCP
 
  Bruce == Bruce Lilly [EMAIL PROTECTED] writes:
 
 Bruce If there really are only 24 items of less than 11 octets
 Bruce each, a trivial solution is to simply list them (with the
 Bruce usual ABNF syntax) as literal strings.  That should take no
 Bruce more than a half-dozen lines.
 
 Perhaps.  I actually find a lot of ABNF specs are not as clear as they
 could be to humans because they are trying to describe the valid
 inputs as strictly as possible.  In many cases I think the spec would
 be more clear if the ABNF were relaxed and other constraints were
 expressed at appropriate levels.
 
 
 ___
 Ietf mailing list
 [EMAIL PROTECTED]
 https://www1.ietf.org/mailman/listinfo/ietf
 




___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RE: Shuffle those deck chairs!

2004-10-15 Thread Brian Rosen
You guys don't have a problem with the defensive suspension/no first use
clauses, do you?

Is there a preferred wording for it?

Brian

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Eric S. Raymond
 Sent: Wednesday, October 13, 2004 10:56 PM
 To: Sam Hartman
 Cc: Florian Weimer; [EMAIL PROTECTED]
 Subject: Re: Shuffle those deck chairs!
 
 Sam Hartman [EMAIL PROTECTED]:
  I think it would be wonderful if the free software community could
  come to a consensus about what their requirements are.
 
 That's not hard.  We need licensing conditions that don't require us
 to either pay royalties or sign legal papers, and which don't inhibit
 re-use of the code by restricting the area of application.
 --
   a href=http://www.catb.org/~esr/;Eric S. Raymond/a
 
 ___
 Ietf mailing list
 [EMAIL PROTECTED]
 https://www1.ietf.org/mailman/listinfo/ietf
 




___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RE: Shuffle those deck chairs!

2004-10-15 Thread Brian Rosen
This text does not seem to cover what we usually encounter in protocol
development.  What happens is that you claim a patent that would be
infringed by implementing the protocol.  Another company has its own patent
that it also claims would be infringed by implementing the protocol.  You
are willing to grant a worldwide, royalty free license to the patent to
anyone, including the other company, so long as the other company doesn't
try to force you to pay a royalty or take out a more restrictive license to
his patent.

Take a look at:
http://www.ietf.org/ietf/IPR/DYNAMICSOFT-SIMPLE.txt

for an example.

Brian

 -Original Message-
 From: RL 'Bob' Morgan [mailto:[EMAIL PROTECTED]
 Sent: Friday, October 15, 2004 1:28 PM
 To: Brian Rosen
 Cc: IETF
 Subject: RE: Shuffle those deck chairs!
 
 
 On Fri, 15 Oct 2004, Brian Rosen wrote:
 
  You guys don't have a problem with the defensive suspension/no first
 use
  clauses, do you?
 
  Is there a preferred wording for it?
 
 I think you'll find virtually identical wording on this topic in several
 well-known licenses:
 
http://www.apache.org/licenses/LICENSE-2.0
 
http://www.mozilla.org/MPL/MPL-1.1.html
 
http://www.eclipse.org/legal/cpl-v10.html
 
http://www.opensource.org/licenses/afl-2.1.php
 
   - RL Bob
 
 




___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf