[ietf-privacy] PPM Review of RFC 1614

2014-05-21 Thread Elwyn Davies
[A quick trial of the random RFC tool.]

An interesting historical snapshot of the early days of hypertext
systems before WWW/HTML/HTTP had come to dominate everything and how
they might be relevant to academic users.  It even predates Internet
Explorer!

Mainly interesting for its lack of interest in security (mentioned in
passing 3 times in 70 pages: twice to say that client side scripting
won't be done in two separate systems including WWW because of security
issues - well, it was half right - we now have scripting *and* security
issues - and one comment that security would be needed for publication
of commercial information) and being totally oblivious of any privacy
concerns.

Significant for Internet archaeologists and evolutionary biologists but
not something that needs to be updated.  

Just thank your lucky stars (or not) that WWW used SGML/HTML rather than
ISO MHEG part 1 coded in ASN.1.

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: IETF 87 Registration Suspended

2013-07-05 Thread Elwyn Davies
On Fri, 2013-07-05 at 00:11 -0400, Noel Chiappa wrote:
  From: John Levine jo...@taugh.com
 
  what's different in Berlin from Paris and Prague and Maastricht.
 
 The Germans have more 'zealous' tax collectors? :-)
 
   Noel
It appears that the goalposts have been moved - the basic change came in
a couple of years ago:
http://www.uktrainingworldwide.com/BB/vat-rules-for-events-and-seminars.html

but the proximal cause may be to do with an update from last September
(and this was instigated in Germany):
See page 159 of
http://ec.europa.eu/taxation_customs/resources/documents/taxation/vat/key_documents/vat_committee/2012_guidelines-vat-committee-meetings_en.pdf

This is probably ultimately down to the tightening of the inter-country
trading rules after the clampdown on so-called carousel trading.

But with the arcana of VAT rules ... who knows (certainly not me
although I have tangled with a few of them)?

Doubtless clearing this up will require a confrontation of tax lawyer
and VAT officer at dawn in some shady forest glade.

/Elwyn
 




New form of remote attendance [was Re: The Nominating Committee Process: Eligibility]

2013-06-28 Thread Elwyn Davies
On Thu, 2013-06-27 at 12:44 +0100, Arturo Servin (probably did not
intend to) wrote:

 What is the rationale of the requirement to attend psychically to
 meetings?

I attend all meetings psychically so spriritual!

Sorry.. couldn't resist.
E.



Re: IAOC Website Updated

2013-06-24 Thread Elwyn Davies
Hi, Ray.

I also think it's good.  On the same theme as Brian, the page is linked
to from the 'IASA' link on the main IETF page.  To make it clear what is
going on, it would be good to put the title:
IETF Administrative Support Activity
at the top of the page.

A couple of other nits:

It might also be useful to add 'IASA/IAOC' to the header of the
Announcements page.

The 'Legal' and 'Subpoenas' pages contain significant duplication:
The text in the 'Subpoenas' section of the 'Legal' page is a large
subset of the text on the 'Subpoenas' page.

Conversely, the 'Appeals' page under operations misses the text on the
appeals process in BCP101 that is hidden under the 'Legal' page.

Regards,
Elwyn 



On Mon, 2013-06-24 at 16:36 +1200, Brian E Carpenter wrote:
 Hi Ray,
 
 I think it's very good. One micro-comment: the menu at the left
 is headed up by the IETF logo (which is in fact a link to
 the main site). I did find that momentarily confusing - maybe
 the first two items could be labelled IASA Home and About IASA
 to make it clear which menu this is?
 
 Best wishes
Brian
 
 On 21/06/2013 06:59, IETF Administrative Director wrote:
  One of the IAOC goals for 2013 was to update the IAOC website to improve
  consistency, organization, linkage, and ease of use.
  
  I am pleased to announce that the IAOC site has been updated and is 
  available 
  now for your use at http://iaoc.ietf.org/.
  
  On the home page see a video of an Overview of the IAOC given by Chair Bob
  Hinden in Orlando that includes a discussion of venue selection and IETF 
  finances.  Also on the home page are recent announcements, as well as 
  reports
  from IANA, the RFC Editor, the IETF Chair, the NomCom Chair, and more.
  
  The navigation bar makes it easy to find financial statements, minutes,
  meeting sponsorship opportunities, and much more.
  
  We hope you find this helpful, the IAOC as more transparent, and of course 
  we
  welcome your feedback.
  
  Ray
  IETF Administrative Director
  
  PS:  Going to IETF 87 in Berlin?  The IAOC will be doing another overview
  session there, Sunday July 28 at 3:00 PM.  Hope to see you there!
  



Re: Content-free Last Call comments

2013-06-11 Thread Elwyn Davies

On 10/06/13 21:37, Pete Resnick wrote:
Russ, our IAB chair and former IETF chair, just sent a message to the 
IETF list regarding a Last Call on draft-ietf-pkix-est. Here is the 
entire contents of his message, save quoting the whole Last Call request:


On 6/10/13 1:45 PM, Russ Housley wrote:
I have read the document, I a support publication on the standards 
track.


Russ



Pete,

I write gen-art reviews.  A proportion of them at IETF Last Call, give 
or take a bunch of boilerplate, consist of the word 'Ready'*.


How do you distinguish the usefulness (or otherwise) of such a review 
from Russ' one liner?


/Elwyn

* and some of the others say 'Not ready' followed by some or many lines 
of comments.


Re: [Gen-art] Gen-art additional LC review of draft-ietf-mmusic-rfc2326bis-34

2013-06-07 Thread Elwyn Davies
On Fri, 2013-06-07 at 11:35 +0200, Magnus Westerlund wrote:
 Hi Elwyn,
 
 Many thanks for the detailed review. We will address the nits you have
 raised, but I cut them out of this reply to focus on the more
 substantial issues you have brought up.
.. and thanks for the quick response.

 
 See inline below.
OK.  I think the responses clear those issues.

I have done a little bit more on the Appendices and liaised a bit with
Robert Sparks.  'Highlights':

Appendix F: I missed that the text/parameter format appeared in the
examples for GET_PARAMETER and SET_PARAMETER. It isn't stated in the
definitions of these methods what encodings are acceptable for the
message bodies that may go with these methods and their responses.
Clearly the new text/parameter MIME format is one.  Is it the only one?
I guess you could use a application/json or an XML format but I guess
these would also either have to be called out explicitly in the method
descriptions or put in as feature extensions.  This needs to be
clarified in the method descriptions (s13).  The upshot of all this is
that I think Appendix F needs to be pulled back into Section 20 as
currently it is the only way to encode the message bodies.

Appendix B: I appreciate that the state machine is illustrative and to
an extent 'abstract'.  However, the tables are really written to
describe the state machine in the server: the action column mostly
describes the events that come into the server (apart from the notify
actions) - sending these 'events' are actions in the client.  The 'real'
state machine in the both the server and the client has a somewhat more
complex form: I'd think that there was a STOPPED state in the server
when the media has reached an end point and not been explictly paused
and STARTING/PAUSING states in the client while the client waits for
response to PLAY/PAUSE respectively.  I think a little bit more
explanation about the dual nature of the columns would solve the
problem.

Appendix C: Pending.

Regards,
Elwyn
 
 On 2013-06-06 02:11, Elwyn Davies wrote:
  I am an additional Gen-ART reviewer for this draft. For background on
  Gen-ART, please see the FAQ at
  
  http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.
  
  Please resolve these comments along with any other Last Call comments
  you may receive.
  
  Document: draft-ietf-mmusic-rfc2326bis
  Reviewer: Elwyn Davies
  Review Date: 5 June 2013
  IETF LC End Date: 5 JUne 2013
  IESG Telechat date: (if known) -
  
  Summary:
  Almost ready.  Generally this is an excellent and well written document,
  particularly given its size.  There are a few minor issues to sort out
  mainly at the nit level and some consistency issues to fix up.  The two
  issues that I have brought out below are really at what the IESG would
  call 'DISCUSS-DISCUSS' level.  The issue of URI scheme redefinition may
  well have already been cleared by the URI expert - the draft does not do
  itself any favours here by failing to explain what the syntax changes
  are in s4.2; this raises immediate red flags that only start to fade a
  couple of hundred pages later. The rudimentary nature of the pipeline
  mechanism is carried over from RTSP 1.0.  I'd like to be sure that this
  has been properly discussed in the WG as it looks pretty flaky to an
  outsider.  There are several inconsistencies between various lists of
  headers that need sorting out and there is no definition of
  Proxy-Authorization in the ABNF.
  
  There are also a fairly large number of editorial nits but these are all
  localized and trivial to fix.  Finally I have't had time to review the
  appendices (maybe there will be a follow up).
  
  Robert Sparks is the main gen-art reviewer for the document; he asked
  for additional eyes on the document given the size and his RAI
  background.  Having (just) seen his review, I think we have both picked
  up on the URI scheme and pipeline issues.  I am not sure that I concur
  with his view that there is significant normative material in the
  appendices - AFAICS the main protocol definition *is* in the main body
  of the document and the bits especiially in Appendices B and C are not
  the core of the protocol.  However this is based on a very cursory
  glance through something like 75 pages of the document.  However, I do
  concur with Robert's view that it needs a security expert to check the
  security stories.
  
  Major(ish) issues:
  s4.2: This section (re-)defines the URI schemes rtsp and rtsps. The 
  last sentence of para 1 states that the 'details of the syntax' of the 
  URIs 'have been changed'.  Is this a reasonable thing to do? Has this 
  been cleared with the URI expert reviewer?  I am not entirely clear what 
  the change involves and the draft doesn't explain exactly how the syntax 
  has been altered  and its consequences (if any) in s4.2.  Some details
  are finally given in s22.14.
 
 These syntax changes where discussed in the reviews I got on the URI
 list. That resulted

Re: [Gen-art] Gen-art additional LC review of draft-ietf-mmusic-rfc2326bis-34

2013-06-07 Thread Elwyn Davies
On Fri, 2013-06-07 at 16:05 +0200, Magnus Westerlund wrote:

  Appendix F: I missed that the text/parameter format appeared in the
  examples for GET_PARAMETER and SET_PARAMETER. It isn't stated in the
  definitions of these methods what encodings are acceptable for the
  message bodies that may go with these methods and their responses.
 
 Exactly, that is intentional. These methods can use anything that has a
 MIME type. Also it has HTTP's mechanisms for determining what formats
 one supports.
 
  Clearly the new text/parameter MIME format is one.  Is it the only one?
 
 It is the only one defined by IETF for this purpose. That is why it is
 in the appendix so that RTSP users shall have something to define the
 parameters they want in. However, they have to accept the limitations of
 a basic text format.
 
  I guess you could use a application/json or an XML format but I guess
  these would also either have to be called out explicitly in the method
  descriptions or put in as feature extensions.  This needs to be
  clarified in the method descriptions (s13).  The upshot of all this is
  that I think Appendix F needs to be pulled back into Section 20 as
  currently it is the only way to encode the message bodies.
 
 I can agree that the format negotiation for the bodies of
 GET/SET_PARAMETER is not clear. I will look at proposing some
 improvements of the text related to the handling of method bodies and
 their format negotiation.
Good. I don't see where the server tells what formats it accepts for
either GET_PARAMETER or SET_PARAMETER.  Also the Accept spec doesn't say
anything about SET_PARAMETER.  AFAICS the client could tell the server
what formats it accepts as a side-effect of DESCRIBE but that's a bit
arcane - and it is not clear how you would separate the formats for
DESCRIBE from those for GET_PARAM and SET_PARAM.
 
 However, I am not pulling in Appendix F. It is an optional to use format
 for parameter value pairs that can be used in these methods, it is not
 required. Nor, does the specification define any parameters that are
 transferred using this interface. The things that are in the appendix
 are not core protocol, they represent either informational things, like
 the examples and the state machine. The other appendices are normative
 definitions of particular choices for things that can be combined or
 used with RTSP, like RTP as media transport.
 
OK, it is possible to use GET_PARAM for basic requirements without using
message bodies, so you can get away without defining a lowest common
denominator format. However, the use of message bodies for SET_PARAM is
RECOMMENDED so it seems a little odd not to ensure that server and
client will have at least one format in common. (And its not as if we
are dealing with a hugely complicated bit of spec for
text/parameters! :-) ).  Then, given the example in GET_PARAMETER it
seems sensible to advise implementing text/parameters as the default for
GET_PARAM also.

/Elwyn





Gen-art additional LC review of draft-ietf-mmusic-rfc2326bis-34

2013-06-06 Thread Elwyn Davies
I am an additional Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at

http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-mmusic-rfc2326bis
Reviewer: Elwyn Davies
Review Date: 5 June 2013
IETF LC End Date: 5 JUne 2013
IESG Telechat date: (if known) -

Summary:
Almost ready.  Generally this is an excellent and well written document,
particularly given its size.  There are a few minor issues to sort out
mainly at the nit level and some consistency issues to fix up.  The two
issues that I have brought out below are really at what the IESG would
call 'DISCUSS-DISCUSS' level.  The issue of URI scheme redefinition may
well have already been cleared by the URI expert - the draft does not do
itself any favours here by failing to explain what the syntax changes
are in s4.2; this raises immediate red flags that only start to fade a
couple of hundred pages later. The rudimentary nature of the pipeline
mechanism is carried over from RTSP 1.0.  I'd like to be sure that this
has been properly discussed in the WG as it looks pretty flaky to an
outsider.  There are several inconsistencies between various lists of
headers that need sorting out and there is no definition of
Proxy-Authorization in the ABNF.

There are also a fairly large number of editorial nits but these are all
localized and trivial to fix.  Finally I have't had time to review the
appendices (maybe there will be a follow up).

Robert Sparks is the main gen-art reviewer for the document; he asked
for additional eyes on the document given the size and his RAI
background.  Having (just) seen his review, I think we have both picked
up on the URI scheme and pipeline issues.  I am not sure that I concur
with his view that there is significant normative material in the
appendices - AFAICS the main protocol definition *is* in the main body
of the document and the bits especiially in Appendices B and C are not
the core of the protocol.  However this is based on a very cursory
glance through something like 75 pages of the document.  However, I do
concur with Robert's view that it needs a security expert to check the
security stories.

Major(ish) issues:
s4.2: This section (re-)defines the URI schemes rtsp and rtsps. The 
last sentence of para 1 states that the 'details of the syntax' of the 
URIs 'have been changed'.  Is this a reasonable thing to do? Has this 
been cleared with the URI expert reviewer?  I am not entirely clear what 
the change involves and the draft doesn't explain exactly how the syntax 
has been altered  and its consequences (if any) in s4.2.  Some details
are finally given in s22.14.


Minor issues:
s11, para 3: I guess that the WG decided that sticking with the RTSP 1.0
model of sending requests and worrying about success of prior prior
pipelined requests was the right answer.  I would have thought that it
might have been helpful to provide qualifiers on the Pipelined-Requests
header that allowed subsequent requests to be suppressed unless the
previous command resulted in one of a given set of status codes with a
'reset' option to 'restart' the pipeline.  It strikes me that this would
avoid some irritating need to work out how to recover from arbitrary
failures in a command chain in a client.

Nits/editorial comments:

General: s/i.e./i.e.,/; s/e.g./e.g.,/

General:  Consistent usage of octet vs. byte (octet preferred).

General: Consistent use of '(session) keep alive' vs. '(session) keep-alive'

General: Consistent use of Base64 vs BASE64.

s1, para 2, last sentence: s/delivered as a time-synchronized 
streams/delivered as time-synchronized streams/

s1. last para: s/used terms/terms used/

s1, last para: Need to expand SDP acronym.

s2, para 1: s/considered use cases/use cases considered/

s2.1, para 1: s/completely out of bands/completely out of band/

s2.1, next to last para: It would be useful to  provide a pointer to 
where the  two URI schemes are defined (s4.2?) so it is clear these are 
internally defined and one needn't go looking for another doc.

s2.2, para 5: s/uses client-selected identifier/uses a client-selected 
identifier/

s2.2, para 5: For  consistency there should be a reference for s18.32 
with Pipelined-Requests.

s2.2, last para: For  consistency there should be a reference for s18.29 
with Media-Range.

s2.3, para 1: Expand SMPTE acronym.

s2.3, para 3: Reference s13.5 for PLAY_NOTIFY

s2.3, para 5:
 The server should also regularly send every 5
 minutes the current media range in a PLAY_NOTIFY request.
Shouldn't this be configurable?

s2.3, last para:
 If the client waits too long
 before resuming the pause point, the content may no longer be
 available.  In this case the pause point will be adjusted to the end
 of the available media.
I know this is a subjective choice, but I would have thought adjusting 
to the beginning of the available media would

Re: Time in the Air

2013-05-31 Thread Elwyn Davies

On 31/05/13 20:18, Scott Brim wrote:

On Friday, May 31, 2013, Dave Crocker wrote:

On 5/31/2013 8:12 PM, Scott Brim wrote:

We'll have multiple airships, one for each set of related
meeting rooms.



is dirigible a new term of endearment for an AD?


Obviously the ADs have a small helicopter so they can get between 
dirigibles.

Don't they use the ADs (Area Drones) controlled from the IESG bunker?



Re: call for ideas: tail-heavy IETF process

2013-05-10 Thread Elwyn Davies
Similarly, AFAICS the 'IESG time' includes IETF last call and the
inevitable delay caused by the quantized nature of IESG teleconferenes.

On the average, this will be somewhere around 28-30 days (2 or 4 weeks
in Last call according to document type plus an average of 1 week until
the earliest possible teleconference and a fudge factor for weekends)
which is an irreducible minimum imposed by our processes.   There is not
much the IESG can do to help on that.

/Elwyn

On Fri, 2013-05-10 at 08:09 +1200, Brian E Carpenter wrote:
 On 10/05/2013 01:13, John C Klensin wrote:
  
  --On Thursday, May 09, 2013 03:32 -0500 Spencer Dawkins
  spen...@wonderhamster.org wrote:
  
  So in this case, we're looking at RFC Editor state =
  Heather, please do something + some working group, please
  do something + author(s), please do something, and we can't
  tell how much time to attribute to each of these ...
  
  You could further add to that list RFC Production Center,
  please do something (different from an RSE wait, which is, or
  at least ought to be, more significant) and IESG or appropriate
  AD, please do something, which does happen.
  
  But the RFC Editor's numbers try (almost always successfully) to
  separate the two waiting on the RFC Editor Function to do
  something (Heather plus Production Center plus, in principle,
  Publisher) from the other states.  Those other states could,
  from their point of view, be aggregated into stuck, someone
  else's problem.   If we are looking for issues with IETF
  end-game process, we need to parse those, but that is a
  different sort of question in terms of data-gathering and
  reporting.
 
 All of which suggests that, ideally, the tracker would include
 a variable onTheHook for each draft, containing at all times
 the person or role responsible for the next step. That isn't
 necessarily implied by the state machine. For example,
 AUTH48 doesn't always imply that the author is on the hook -
 it may be that the author has asked the WG Chair to ask the
 WG for a quick review of a proposed last-minute change. At
 that point, the WG as a whole is on the hook.
 
 Brian



Re: Accessing tools from IETF pages

2013-05-08 Thread Elwyn Davies
Both links work just fine from a selection of browsers/os/machines other
than Msoft. (Firefox, Evolution, Chrome)  It also works on an old
version of IE8 but reports errors.

Presumably turning off some strict error checking in IE allows it to
display.

Running the page through the W3C HTML validator reports 14 Errors and 3
Warnings:
http://validator.w3.org/check?uri=http%3A%2F%2Ftools.ietf.org%
2Fcharset=%28detect+automatically%
29doctype=Inlinegroup=0user-agent=W3C_Validator%2F1.3+http%3A%2F%
2Fvalidator.w3.org%2Fservices

/Elwyn

On Wed, 2013-05-08 at 15:05 +0100, t.p. wrote:
 I wanted to submit an I-D so I wanted to access the tools, as I have
 done before, so I clicked on 'IETF Tools' from
 http://datatracker.ietf.org/wg/
 and when that failed tried again with 'Tools Team Pages' from
 http://www.ietf.org/iesg/
 with the same result.  Can anyone else get to tools from that link?
 
 It resolves to
 http://tools.ietf.org/
 which Internet Explorer (what else?) assures me cannot be displayed,
 either from the link or from typing it into the Open drop down.
 
 The trouble ticket drew a response of
 
 It sounds like the tools pages were experiencing some issues that have
 now been resolved.
 
 Well, for a few milliseconds, perhaps, but I get the same response
 24x7x365x...
 
 Not that easily put off, I found a way around it (thank you, Google),
 but in the spirit of wanting others to be able to do what I can (with
 some difficulty) do, I would like those links to work (or to disappear).
 
 Tom Petch
 
 



Re: call for ideas: tail-heavy IETF process

2013-05-03 Thread Elwyn Davies
On Fri, 2013-05-03 at 14:27 +0100, Stephen Farrell wrote:
 On 05/03/2013 01:59 PM, Thomas Narten wrote:
  
  If you look at the delays documents encounter (both in WG and in IESG
  review), the killer is long times between document revisions. Focus on
  understanding the *why* behind that and what steps could be taken to
  make improvements.
 
 Good point. I guess the obvious answers are not enough
 cycles 
and not enough concentrated cycles - designing and documenting a
protocol in my experience requires a longish period of undisturbed
concentration by the person with the editing crayon, and responsive,
deep and immediate review by co-authors to generate fast turn round
reviews of versions.
Its hard enough keeping the in-brain implementation of the protocol
running accurately day-by-day.  If there are gaps of weeks rebooting the
implementation wastes precious concentrated time.  Probably putting a
few people with no other commitments in a isolated space generates
fastest results. Maybe we could get ISOC to provide a retreat space (or
one per continent) for protocol designers?
 and, for newer authors, uncertainty about how to
 get stuff done, but are there other less obvious answers?
 (Input here might really help the IESG discussion btw since
 in the nature of things, we're less likely to realise what
 newer or less frequent participants find problematic.)
One thing that might help:
We have directorates and review panels.  Can we distil any/more of their
wisdom into checklists/guidance for protocol writers?
Some is already there (not a complete list):
BCP 72 for security considerations 
BCP 41 on congestion control
BCP 61 on Strong Security Requirements
Some stuff in RFC 6385 for gen-art

[Some of this is getting a bit long in the tooth.]

So what do you ...
- think about when designing the security aspects/transport congestion
aspects/... of a new protocol?
- what triggers alarm bells/gold stars when you are reviewing the
general principles/security aspects/congestion/ABNF/state
machines/mib/xml/extensibility/ of a draft?

Regards,
Elwyn

 
 S.



Re: call for ideas: tail-heavy IETF process

2013-05-01 Thread Elwyn Davies

On 01/05/13 21:05, Brian E Carpenter wrote:

On 02/05/2013 05:59, Dave Crocker wrote:

The blog nicely classes the problem as being too heavy-weight during
final stages.  The quick discussion thread seems focused on adding a
moment at which the draft specification is considered 'baked'.

I think that's still too late.

What, you agree with your younger self?

http://tools.ietf.org/html/draft-carpenter-icar-sirs-01

Apart from the non-diverse acronym, I still think that proposal
was a good one.

 Brian
Rereading the background document that lead to the SIRS proposal is also 
worthwhile:

http://tools.ietf.org/html/draft-ietf-problem-issue-statement-00

I think the views in sections A.2.6. to A.2.9 are still pretty much 
applicable; judging from recent comments some people still think the 
situation with the IESG is a 'battle of wills'.


I guess one way of summarising this whole problem might be:
We set on a group of people (a WG) who by definition are supposed to 
work in 'common mode' on a particular problem in what is mostly a closed 
bubble. It's perhaps not entirely surprising that what comes out at IETF 
Last Call time has more than its fair share of 'common mode failures', 
symptoms of groupthink and blinkered views of the overall requirements 
for effective operation in the wider Internet.


The comments in the 'problem' draft and the SIRS proposal reflect an 
attempt to suggest how the closed bubble can be kept in contact with the 
wider world.  However, getting the relationship between outside 
reviewers and the WG teams right would be non-trivial - not to mention a 
significant organisational effort and a load on the reviewers.  To be 
honest, AFAIK we have never attempted to quantify how much extra effort 
(if any) a SIRS-like exercise would require as compared with the 
existing directorate reviews.


Personally, I don't believe that we should attempt to categorise some 
I-Ds as more significant than others.  This requires 20-20 hindsight 
with which we are certainly not equipped.


/Elwyn
BTW
Re the diversity discussion: take a look at the editorial panel on the 
problem draft - ok, its only along one of the dimensions.


Jari might also remember a contribution he made to 'problem':

o  WG process is too slow, because of feeping creaturism, deadlocked
   conflicts or lack of worker bandwidth (Jari Arkko)

I can certainly agree on the feeping creaturism!

/E



Re: call for ideas: tail-heavy IETF process

2013-05-01 Thread Elwyn Davies

On 01/05/13 21:05, Brian E Carpenter wrote:

On 02/05/2013 05:59, Dave Crocker wrote:

The blog nicely classes the problem as being too heavy-weight during
final stages.  The quick discussion thread seems focused on adding a
moment at which the draft specification is considered 'baked'.

I think that's still too late.

What, you agree with your younger self?

http://tools.ietf.org/html/draft-carpenter-icar-sirs-01

Apart from the non-diverse acronym, I still think that proposal
was a good one.

 Brian
Rereading the background document that lead to the SIRS proposal is also 
worthwhile:

http://tools.ietf.org/html/draft-ietf-problem-issue-statement-00

I think the views in sections A.2.6. to A.2.9 are still pretty much 
applicable; judging from recent comments some people still think the 
situation with the IESG is a 'battle of wills'.


I guess one way of summarising this whole problem might be:
We set on a group of people (a WG) who by definition are supposed to 
work in 'common mode' on a particular problem in what is mostly a closed 
bubble. It's perhaps not entirely surprising that what comes out at IETF 
Last Call time has more than its fair share of 'common mode failures', 
symptoms of groupthink and blinkered views of the overall requirements 
for effective operation in the wider Internet.


The comments in the 'problem' draft and the SIRS proposal reflect an 
attempt to suggest how the closed bubble can be kept in contact with the 
wider world.  However, getting the relationship between outside 
reviewers and the WG teams right would be non-trivial - not to mention a 
significant organisational effort and a load on the reviewers.  To be 
honest, AFAIK we have never attempted to quantify how much extra effort 
(if any) a SIRS-like exercise would require as compared with the 
existing directorate reviews.


Personally, I don't believe that we should attempt to categorise some 
I-Ds as more significant than others.  This requires 20-20 hindsight 
with which we are certainly not equipped.


/Elwyn
BTW
Re the diversity discussion: take a look at the editorial panel on the 
problem draft - ok, its only along one of the dimensions.


Jari might also remember a contribution he made to 'problem':

o  WG process is too slow, because of feeping creaturism, deadlocked
   conflicts or lack of worker bandwidth (Jari Arkko)

I can certainly agree on the feeping creaturism!

/E



Re: Purpose of IESG Review

2013-04-15 Thread Elwyn Davies

On 15/04/13 15:45, Brian E Carpenter wrote:

On 15/04/2013 15:23, Ted Lemon wrote:

...

So in practice, although I feel great sympathy for this position, I think it's 
mistaken.   I want the other ADs to comment on anything that they notice that 
looks like a problem.

There's an important class of problem that can only be found by someone
who is *not* a specialist - that is to say wording that's perfectly
clear and unambiguous to someone very familiar with the topic, but is
quite unclear to someone who isn't. This matters because we (presumably)
want our specifications to be useful to people who are implementing or
deploying them without already being members of the inner circle.

Just to be specific, here is a piece of text that came out of a WG
not so long ago. I have bowdlerised it:

The Foobar standards [RFCxxx], [RFCyyy] provide useful generic
functionality like blah, blah and blah for reducing the overhead in
Boofar networks.  This functionality can be partly applied to Bleep.

That was it - a third party implementing Bleep was apparently supposed
to guess which bits of those RFCs applied where.

This led to a DISCUSS and seven months of delay before that partly
was disambiguated. Was that inappropriate out-of-area review?

Brian

On 15/04/13 14:09, Jari Arkko wrote:

[Responding to Dave Crocker]

But what is tiring about this line of justification is its continuing failure 
to balance the analysis by looking at the costs and problems that come with it. 
 Does it provide regular and sufficient benefit to justify its considerable 
costs?

Agreed.
I would say it usually does justify its costs - skimping on the QA is 
almost always a bad idea.  Speaking also from a gen-art perspective, 
getting a level of clarity and ease of use into a document may take a 
little while  for a number of reviewers and authors, but the costs  and 
benefits need to include the effort of implementers, testers and future 
users who will not appreciate getting a product that doesn't 
interoperate because the spec was unclear or they missed a point that 
might have been 'obvious' to the original authors.  The size of the 
affected population is much bigger after publication (at least if 
anybody actually cares about the RFC).


I have to say that in my experience the seven months of delay that Brian 
cites is rather unusual.   For the vast majority of documents, the sorts 
of clarification needed can be sorted out in a couple of rounds of 
email, and the results are unlikely to require recycling back to the 
WG.  That being said, there certainly are documents where I wonder why 
anybody seriously thought the document was ready for publication; trying 
to fix the process 'tail heaviness' (as Jari describes it) would help if 
we could find a way.  It could be argued that the tail process is just 
too polite.  Once a document embarks on the publication process we 
seemingly inevitably send it through all those reviews resulting in 
multitudinous politely phrased DISCUSSes and comments when what it 
really needs is a blunt refusal followed by some competent editing.


/Elwyn


Re: Comments for Humorous RFCs or uncategorised RFCs or dated April the first

2013-04-06 Thread Elwyn Davies
Right.. they are mind expanding drugs.  Essential for keeping us sane.

/Elwyn

Sent from my ASUS Pad

Stewart Bryant (stbryant) stbry...@cisco.com wrote:



Sent from my iPad

On 6 Apr 2013, at 14:04, Abdussalam Baryun abdussalambar...@gmail.com 
wrote:

 
 If the date is
 special then thoes RFCs SHOULD be *historical*.
 

Surely the correct requirement is :

If the date is special then those RFCs MUST be *hysterical*.

- Stewart






Re: On the tradition of I-D Acknowledgements sections

2013-03-25 Thread Elwyn Davies
On Sun, 2013-03-24 at 22:23 -0400, Joel M. Halpern wrote:
 I think I at least partly disagree.  The acknowledgements section of 
 RFCs was not, and to the best of my knowledge is not, concerned with 
 capturing the history of where specific changes or ideas came from.  It 
 ought to be concerned with giving credit to folks who made particularly 
 large, but not authorship level, contributions to the document.
 
+1

.. and such contributions may well be reviews that don't change the
substance of the document or add new ideas but result in improvments to
the expression of the ideas or catch mistakes.  These can be just as
vital as extra ideas to making a successful RFC.

IMO it is vital that for reviewing to be successful it has to be
'ego-free'.  The reviewer shouldn't be aiming to catch the authors out
or push his/her prejudices into the document but rather to collectively
improve the document.  So 'ego-free' should mean that the reviewer is
looking for a better document and not a 'puff' in the acknowledgements.
Yes, it is nice to get an acknowledgement of your review work but I'm
not going to go beat up the authors if I don't get it.  In practice, the
reviews that are perhaps least likely to be acknowledged are the ones
which say 'I read it: it was well written and it looked good to me.'
They are very nearly as much work as the ones that say 'It's broken
because...'!

As regards 'history': RFCs record 'state' and not history.  That isn't
to say that recording history in some other place than the fallible
memories of participants and fragmented threads in mailing lists
wouldn't be advantageous not least in avoiding wheels being reinvented
and failures being repeated.  But I have never been involved in a
project that actually even tried to keep a 'design diary' or similar
document.  Probably, mea culpa sometimes! Whatever, it doesn't belong in
the resulting RFC.

Regards,
Elwyn




Re: Please review draft-housley-rfc2050bis-00.txt

2013-03-20 Thread Elwyn Davies
Hi, Russ.
Two points:

On Tue, 2013-03-19 at 22:30 -0500, David Farmer wrote:
snip
 
 Rereading things again, I have another suggestion;
 
 4) Split the Goals of the Internet registry system out of the 
 Introduction.  The Intro starts out talking about the document, its 
 goals, and what is in scope and out of scope of the document.  Then 
 transitions to talking about the goals of the Internet registry system. 
   I think the goals of the Internet registry system should be a separate 
 section from the Introduction. And, the Introduction should be expanded 
 to better describe the purpose of the document.

I agree fully with this comment.  The first para of s1 needs a rewrite
and a little expansion to match up with the abstract to form a proper
intro.  The goals do belong in a separate section
 

Also regarding the first para of s4:

This contains some woolly hand-waving weasel words at the end:

 Over the years, the Internet Numbers Registry System has developed
mechanisms by which the structures, policies, and processes of the
Internet Numbers Registry System itself can evolve to meet the
changing demands of the global Internet community.  Further evolution
of the Internet Numbers Registry System is expected to occur in an
open, transparent, and broad multi-stakeholder manner.
^^^
Who are these stakeholders?  Is this (just) the organisations named in
the document (I think that would be ICANN/IANA, IETF, *IRs - a large
number!) or is the community to be consulted? and governments?  So do we
have a view as to how all these people are to be informed that some
evolution is needed?

Regards,
Elwyn



Re: IPR view (Re: Internet Draft Final Submission Cut-Off Today )

2013-03-07 Thread Elwyn Davies
Submission allowed; publication postponed?

/Elwyn

On Thu, 2013-03-07 at 10:34 +0100, Carsten Bormann wrote:
 Oh, and one more data point:
 
 The Internet-Draft archive also functions as a timestamped signed public 
 archival record of our inventions.
 (Which are often trivial, but triviality won't stop patenting of copycats, 
 while a good priority more likely will.)
 
 This function is effectively suspended for six weeks a year.
 
 Grüße, Carsten
 
 PS.: (If that sounds like I'm contradicting myself that's only because we 
 haven't found the right solution yet.)
 
 
 On Feb 27, 2013, at 19:49, Carsten Bormann c...@tzi.org wrote:
 
  On Feb 27, 2013, at 19:18, ned+i...@mauve.mrochek.com wrote:
  
  routing around obstacles
  
  It turns out for most people the easiest route around is submitting in time.
  
  That is actually what counts here: how does the rule influence the behavior 
  of people.
  
  Chair hat: WORKSFORME.  (And, if I could decide it, WONTFIX.)
  
  Grüße, Carsten
 



More Plugins for Firefox to do draft searches and draft/RFC HTML downloads

2013-03-05 Thread Elwyn Davies
Hi.

Thanks to Dale for the new search plugins - useful.

I made these other ones that get RFCs and use the tools.ietf.org HTML
page to find sets of drafts from a few words.  They were originally
published on the tools discuss list about 19 months ago.
  
Download the attachments into the searchplugins sub-directory of the 
Firefox installation directory or your local profile
(~/.mozilla/firefox/X.default/searchplugins on Linux) and restart
Firefox. Its easy enough to customize the plugins if you want a specific
WG/RG because you are dealing with it all the time.

I'd like the searches to download the HTML or text etc to taste if the 
search finds only one draft, but the 404 error handler doesn't deal with
extra parameters at the mome

Hope these might be useful.

Regards,
Elwyn


SearchPlugin xmlns=http://www.mozilla.org/2006/browser/search/;
ShortNameRFC HTML get (RFC ...)/ShortName
DescriptionIETF RFC Series Archive Search/Description
InputEncodingUTF-8/InputEncoding
Image width=16 height=16data:image/png;base64,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
Url type=text/html method=GET template=http://tools.ietf.org/html/{searchTerms};
/Url
SearchFormhttp://tools.ietf.org/id/SearchForm
/SearchPlugin
SearchPlugin xmlns=http://www.mozilla.org/2006/browser/search/;
ShortNameWG Draft (draft-ietf-...)/ShortName
DescriptionIETF Working Group Internet Draft Archive Search/Description
InputEncodingUTF-8/InputEncoding
Image width=16 

Re: Appointment of a Transport Area Director

2013-03-04 Thread Elwyn Davies
+1 to Mary's comments.. few words in line..

Elwyn Davies
On Mon, 2013-03-04 at 09:11 -0600, Mary Barnes wrote:
 On Mon, Mar 4, 2013 at 7:39 AM, Eric Burger ebur...@standardstrack.com 
 wrote:
  There is obviously no easy fix.  If there was, we would have fixed it, 
  obviously.
 
  What I find interesting is after saying there is nothing we can do, you go 
  on to make a few concrete proposals, like bringing the directorates more 
  into the process.  It is thinking like that, how to do things different, 
  that will get us out of the bind we have made for ourselves.
 
  Note that I am not married to the idea of expanding the role of 
  directorates. I am married to the idea that we can think ourselves outside 
  of the box.
 
 
  On Mar 4, 2013, at 8:07 AM, Eggert, Lars l...@netapp.com wrote:
 
  Hi,
 
  On Mar 4, 2013, at 13:18, Eric Burger ebur...@standardstrack.com wrote:
  I will say it again - the IETF is organized by us.  Therefore, this 
  situation is created by us.  We have the power to fix it.  We have to 
  want to fix it.  Saying there is nothing we can do because this is the 
  way it is is the same as saying we do not WANT to fix it.
 
  what is the fix?
 
  The IETF is set up so that the top level leadership requires technical 
  expertise. It is not only a management job. This is a key differentiator 
  to other SDOs, and IMO it shows in the quality of the output we produce. 
  The reason the RFCs are typically of very good quality is that the same 
  eyeballs go over all documents before they go out. This creates a level of 
  uniformity that is otherwise difficult to achieve. But it requires 
  technical expertise on the top, and it requires a significant investment 
  of time.
 [MB] Personally, I'm not at all seeing this concept of uniformity in
 terms of the output. I don't even see consistency amongst documents
 for specific WGs.  We can't even agree how normative language should
 be used in documents.  I've been a gen-art reviewer for 9.5 years and
 we don't even come close to producing consistent documents.  I fully
 agree that there is significant value in the cross area reviews, in
 particular for security.  But, I personally think that can happen as
 effectively at the directorate review as at the IESG level of review.
 [/MB]
[EBD] I have also been a gen-art reviewer for about a long as Mary and I
totally agree that consistency is not what we get, especially on the
quality front.  However really the only consistencies that are really
vital are comprehensibility and technical quality.  Variations in style
make life a little more entertaining and I would prefer not to resort to
some sort of uniform legalese - in any case, not all drafts are talking
about the same sort of thing. And, yes, multiple reviews with different
points of view do help. [/EBD]

 
 
  I don't see how we can maintain the quality of our output if we turn the 
  AD position into a management job.
 [MB] I don't think anyone is suggesting to turn it into just a
 management job.  It still requires someone with significant technical
 expertise in other areas. I don't think there's anyone hanging around
 in IETF that's being considered for IESG positions that doesn't have
 significant technical expertise in some areas.  This problem has been
 around since I was Nomcom chair, so it seems that there is no easy
 solution - would there be a way to split the role, so that you do have
 a solid technical advisor, they just have to bother with reviewing
 documents unless they are brought to their attention and they don't
 have to worry about managing the day to day activities of WGs.  I
 would be curious to know the typically time split between these two
 tasks for the average AD.   [/MB]

[EBD] Maybe the difference between what I do and the AD's reviewing job
is context.  Mine is diffuse - I have a general idea what is going on
and enough background to recognize when something might be broken; I
also have enough understanding to recognize when a novice would get lost
in a document that has its head down in the sands of jargon and
groupthink. We call ADs AREA Directors presumably because they have the
context of their area in mind when reviewing; I don't. Hopefully, an AD
is not seeing a doc that comes to the IESG for the very first time
because s/he has got some idea of what is going on in the WG or has
sponsored a doc. Hopefully (again) this gives the AD some context in
which to view the document, know its importance overall, interpret
comments from others and home in on key areas where they anticipate
there might be concerns; so there is synergy between the managemnt and
technical reviewing tasks.  Area directorates probably fall in between
on the context scale.  But ultimately the AD is called upon to make one
or more judgment calls both as regards documents and the performance of
WGs.  I would be extremely unhappy if these calls were purely management
exercises - they need a combination of technical nous, management

Gen-art last call review of draft-ietf-opsawg-oam-overview-08.txt

2013-01-22 Thread Elwyn Davies
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at

http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-opsawg-oam-overview-08.txt
Reviewer: Elwyn Davies
Review Date: 22 Jan 2013
IETF LC End Date:25 Jan 2013
IESG Telechat date: (if known) -

Summary: In my opinion, this draft has serious issues as described
below.

Major issues:
General 1: Title vs Abstract vs Section 1 vs actual content:

Here in the UK a well-known brand of varnishes and wood preservative
paints uses the slogan 'Does what it says on the tin!'.  If my
understanding and the write-up in RFC 6491, OAM covers a whole lot more
than the coverage of the specific mechanisms discussed in this
document .. and there are various other mechanisms such as SNMP and
Netconf that support the OAM constellation.  I would take the view that
this document certainly does not 'do what it says on the tin'.
Accordingly I take issue with the title as it doesn't provide a total
overview of OAM mechanisms; the abstract closes down the scope of OAM as
compared with RFC 6491 and s1 restricts it even more - and certainly
does not summarize all the OAM tools and mechanisms defined in the IETF.
The last para of s1 claims that 'management aspects are outside the
scope of this document' - if this is really saying that this 'overview'
of OAM skips the whole M aspect of OAM then I'm afraid the document is
badly misnamed.  And it significantly reduces the value of the work.

General (2): The intended purpose of this document: Back in 2011 Stewart
Bryant summarized a review of a previous version of this document from
the routing directorate
(https://datatracker.ietf.org/doc/draft-ietf-opsawg-oam-overview/history/ entry 
dated 2011-08-10 referring to version 05 of the document).  IMO the initial 
section of that review regarding the audience of this document was well 
targeted and *has not been fixed*.  If this is intended as an introductory 
overview for people wishing to see what OAM is about in the IETF then it needs 
further introductory text and some background.  It should also state what its 
target audience actually is.

General (3): I don't know if Scott Bradner has actually produced a proto
shpeherd write up, but I would be intrigued to know the level of
concensus behind this document.  In particular the tool classification
in s1.1 and terminology in s2 (particularly s2.2.2) is that used
exclusively in the MPLS-TP work in the IETF which is derived from the
802.1ag terminology.  The terminology is presented as if it is common to
OAM work across the IETF. Does the IETF management community at large
concur with this expansion of the applicability of the terminology set
based on 'Management Domains' etc?

General (4): As an overview, I think it would be advisable to point out
that one reason for the multiplicity of tools is that they support at
least four different data plane technologies (native IP, vanilla MPLS,
MPLS-TP and PWE) and note that in several cases the data plane
technologies rely on distinct (IP-based) management channels to allow
the information gleaned by the operations in the the data plane to be
reported back to the application that originated the operation. 


Minor (or at least less major) issues:

s1, para1: For consistency with  the abstract, s1.1 .. and because I'd 
expect OAM to handle it as well ... OAM deals with performance 
monitoring and statistics gathering as well as dealing with degradation.

s1.1: The section is entitled building blocks but actually only mentions 
one block, i.e., the OAM protocol.  Presumably this section really ought 
to say something about the applications and device drivers that have to 
instantiated in the MPs.  In particular as introduction to the text in 
the following section it should say something about classifying 
applications into continuously running or proactive monitoring and 
on-demand applications (since the latter are introduced without any 
definition in the next section.)


s2.2.2/3: I am not familiar with 802.1 management issues and I was 
rather confused by the logical status of MIPs .  The text here seems to 
indicate that they are intermediate and generally don't terminate 
messages but then says in s2.2.3 that messages are 'destined to' MIPs.  
Looking for some additional understanding, I fetched up at Wikipedia 
(now there's a surprise) http://en.wikipedia.org/wiki/IEEE_802.1ag.  
This page mentions the concept of maintenance domains and the 
explanation of MIPs as internal points in the domain that generally 
forward messages within the domain whereas end points (MEPs) are 
effectively on the domain boundary. This makes a whole lot more sense
and seemed to be a rather better set of term definitions than we have in
this draft.  
I noticed eventually that the term Management Domain (MD) had appeared
in the first line of s1.1 but does

Re: Idea for a process experiment to reward running code...

2012-12-03 Thread Elwyn Davies
Hi.

On Mon, 2012-12-03 at 11:02 +, Brian E Carpenter wrote:
 On 03/12/2012 06:01, Martin J. Dürst wrote:
  One of the advantages of a standards organization such as the IETF is
  cross-concern review. For the IETF, one very strong cross-concern is
  security. Another one (also for my personally) is internationalization.
  Another, more vague one, is general architecture. Early running code is
  very often (not always) characterized by the fact that such
  cross-concerns are actively or passively ignored.
 
 An excellent point. The fact that a hack works, and can be implemented,
 does not alter the fact that it's a hack. This is the sort of thing that
 cross-area review is supposed to look for. As a gen-art reviewer, I am
 sometimes surprised by what gets through to Last Call in the regular
 process - if the whole review process is squeezed down to a couple
 of weeks, we will definitely miss cross-area issues.

I also have the experience as a gen-art reviewer of seeing some pretty
awful pieces of work making through even to IESG review.  

However, I don't think that a short last call cycle need necessarily
compromise cross-area review. There has always been the possibility for
authors or wg chairs to request a early gen-art review with a view to
checking out whether something is in good shape cross-area and for
non-specialists.  This facility is not much used (I think I have done 3
in 8 years on the gen-art team) but it is there, and I guess the team
could cope with a few more since it doesn't drastically alter the total
workload. So it would be entirely possible for a draft that might be
fast-tracked to get some early review.

Given that there is also open source code, reviewers have the chance to
take a look at that and see the degree of hackiness involved.  

So I'd be for trying the experiment - and asking some cross-area
reviewers to take an early sniff.

Regards,
Elwyn

 
 Encouraging running code is a Good Thing. Publishing sloppy specifications
 is a Bad Thing.
 
 The Interop show network used to be a Very Good Thing. We've lost that,
 though I was delighted to see some actual running code at Bits-n-Bytes
 in Atlanta. More please. Maybe a prize for Best Demo?
 
Brian
 
  
  I had a look at your draft and checked for security and
  internationalization, but only found the former, and not not in a
  discussion about how this proposal would make sure that cross-concerns
  are adequately addressed.
  
  Regards,   Martin.
  
  On 2012/12/02 5:12, Stephen Farrell wrote:
 
  Hi all,
 
  I've just posted an idea [1] for a small process improvement.
  If it doesn't seem crazy I'll try pursue it with the IESG as
  an RFC 3933 process experiment. If its universally hated then
  that's fine, it can die.
 
  The IESG have seen (more-or-less) this already but it hasn't
  be discussed, so this is just a proposal from me and has no
  official status whatsoever.
 
  Any comments, suggestions or better ideas are very welcome.
  Feel free to send me comments off list for now, or on this
  list I guess. If there's loads of email (always possible,
  this being a process thing;-) we can move to some other list.
 
  Regards,
  Stephen.
 
  [1] http://tools.ietf.org/id/draft-farrell-ft
 
  
 



Re: Idea for a process experiment to reward running code...

2012-12-03 Thread Elwyn Davies
On Mon, 2012-12-03 at 14:28 +, Stephen Farrell wrote:
 
 On 12/03/2012 02:25 PM, Barry Leiba wrote:
  Running code, when it's an organic part of the document development,
  is undoubtedly a good thing -- it doesn't make everything right, but,
  yes, it does do *some* spec validation and probably does help spec
  quality.
 
 Fully agree. And this kind of experiment may encourage that
 good thing some more. Or not. We'll not see if we don't try.
 We may see if we do try. I think its worth trying. (That's
 fairly obvious I guess:-)
 
 S.

Another thing which it might help with is weeding out gratuitous
proliferation of options.

Regards,
Elwyn



Re: Idea for a process experiment to reward running code...

2012-12-03 Thread Elwyn Davies
Barry responded...

On Mon, 2012-12-03 at 09:50 -0500, Barry Leiba wrote:
 Elwyn says...
 
  However, I don't think that a short last call cycle need necessarily
  compromise cross-area review. There has always been the possibility for
  authors or wg chairs to request a early gen-art review with a view to
  checking out whether something is in good shape cross-area and for
  non-specialists.  This facility is not much used (I think I have done 3
  in 8 years on the gen-art team) but it is there, and I guess the team
  could cope with a few more since it doesn't drastically alter the total
  workload. So it would be entirely possible for a draft that might be
  fast-tracked to get some early review.
 
 Do you really think it's likely that a chair who's trying to
 fast-track a document will likely go out asking for early GenART,
 SecDir, AppDir, and OpsDir reviews?
 
A few do already.  But seriously, if the wg chair(s) actually have an
interest in the technology and feel there is a valid reason for getting
something decent out into the world quickly then they could well be
motivated to do just that.  If our wg chairs are really just
bureaucratic process minders then it's time we found some different
ones, but I don't think they are. Maybe this is just a plea for a bit
more parallel processing and a few less silos.

/Elwyn 



Re: [Gen-art] Gen-art last call review of draft-ietf-codec-opus-12.txt (completed)

2012-05-18 Thread Elwyn Davies
Hi, Jean-Marc and co-authors

On Thu, 2012-05-17 at 12:49 -0400, Jean-Marc Valin wrote:
 Hi Elwyn,
 
 We're submitted a -14 draft to address your comments. Again, see the
 response to each of these issues in the attached document.

I think we are done.  Thanks once again for the rapid response.

Regards,
Elwyn

PS
I still prefer octets.

/E
 
 Thanks again,
 
   Jean-Marc
 
 
 On 12-05-16 05:26 PM, Elwyn Davies wrote:
  Hi, Jean-Marc.
  
  ... and thanks for the super-quick response!  You have been quite busy.
  
  I have had a look through the new draft and I think the additions help
  considerably with comprehension for the naive (and to give new
  implementers a way in.)
 



Re: [Gen-art] Gen-art last call review of draft-ietf-codec-opus-12.txt (completed)

2012-05-17 Thread Elwyn Davies
Hi, Jean-Marc.

... and thanks for the super-quick response!  You have been quite busy.

I have had a look through the new draft and I think the additions help
considerably with comprehension for the naive (and to give new
implementers a way in.)

I'll leave you to negotiate with the RFC Editor over the Wikipaedia
references.  To quote the RFC Style guide
http://www.rfc-editor.org/rfc-style-guide/rfc-style
Section 4.8, item (x) References, last section:
 URLs and DNS names in RFCs
 
   The use of URLs in RFCs is discouraged, because many URLs are not
   stable references.  Exceptions may be made for normative
   references in those cases where the URL is demonstrably the most
   stable reference available.  References to long-lived files on
   ietf.org and rfc-editor.org are generally acceptable.
They are certainly convenient *as long as they remain in place and
aren't corrupted*.

I found a couple of trivial editorial nits in the changes:
s4.3.3 (in the added text):
 The CELT layer, however, can adapt over a very wide range of rates,
 and thus has a large number of codebooks sizes
s/codebooks/codebook/

s4.3.3, para after Table 57: s?the maximums in bit/sample are
precomputed?the maximums in bits/sample are precomputed?

Also suggest:
s4.3: Add reference for Bark scale: Zwicker, E. (1961), Subdivision of
the audible frequency range into critical bands, The Journal of the
Acoustical Society of America, 33, Feb., 1961.

A few responses in line below (agreed pieces elided): 

Regards,
Elwyn  Davies


On Tue, 2012-05-15 at 20:33 -0400, Jean-Marc Valin wrote:
 Hi Elwyn,
 
 Thanks for the very thorough review. We've addressed your issues and
 submitted draft version -13. See our response to each of the issues you
 raised (aggregated from all the authors) in the attached document.

Thanks very much to all the authors.
 
 Cheers,
 
   Jean-Marc
 


 Elwyn Davies wrote:
  Major issues: 
  Can we accept the code as normative?  If not how do we proceed?
 
 The issue with code being normative was specifically addressed in 
 the guidelines document for this WG (RFC 6569).
 
Yes.  I failed to read this although Robert Sparks did point out to me
that the code was normative - but he didn't think he said this was
agreed in advance (or maybe I didn't understand what he was saying).

To be honest I would like to have had the time to tie the text to the
code but realistically that is several weeks or even months work to do
it properly - without that I feel that I have only done half a job. I
may decide that it interests me enough to have a superficial go next
week but no promises!

 
  Minor issues:
  Contrast between decoder descriptions of LP part and CELT part:  The
  SILK descriptions go into gory detail on the values used in lots of
  tables, etc., whereas the CELT part has a very limited treatment of
 the
  numeric values used (assuming reliance on finding the values in the
  reference implementation, either explictly or implicitly).  There
 are
  things to be said for both techniques.  I was wondering (while
 reading
  the SILK description) if the authors have any means of automatically
  generating the tables from the code in the SILK part (or vice versa)
 to
  avoid double maintenance. On the other hand, there are pieces of the
  CELT decoder description (especially in s4.3.3 where knowing numbers
 of
  bands, etc.) where some actual numbers would help comprehension.
  
 
 We have made many changes to section 4.3 (and 4.3.3 specifically) to
 address
 the specific issues below. As for the tables, they are not generated
 automatically.

I think this is addressed satisfactorily now.  There is still some
difference but it is much reduced and not so glaring now. The addition
of the band tables really helps.

 
 
  s2 (and more generally):  The splitting of the signal in the
 frequency
  domain into signal (components?) below and above 8kHz presumably
  requires that the signal is subjected to a Discrete Fourier
 Transform to
  allow the signal to be split.  I think sometging is needed in s2 to
  explain how this is managed (or if I don't understand, to explain
 why it
  isn't necessary).
 
 No DFT is used. The lower band is obtained through resampling (which
 is already described) and the higher band is obtained by not coding
 the lower band with CELT (the text says that CELT starts at band 17 in
 hybrid mode). The explanation was reworded to make this as clear as
 possible at this point in the text.

[I thought I had reworded this comment in the 2nd version to talk about
MDCT but no matter]. 
Yes, para 5 of s2 does say that the bands are discarded.  I think it
would useful to have a concrete statement in the new text added to s4.3
that bands 0 to 16 are discarded in hybrid mode (thereby making the 17
in the band boost section more obvious) [There is a comment below that
you have added some text about band 17

Re: Gen-art last call review of draft-ietf-codec-opus-12.txt (completed)

2012-05-15 Thread Elwyn Davies
On Mon, 2012-05-14 at 17:08 -0600, Cullen Jennings wrote:
 Thank you kindly for the detailed review. More inline ...
 
 On May 14, 2012, at 9:06 AM, Elwyn Davies wrote:
 
  Summary: 
  Before offering some views on the document, let me say that this piece
  of work seems to be a tour de force on behalf of its developers.  It is
  certainly one of the (if not the) most technically complex pieces of
  work that has been presented to the IETF,
 
 And I would like to say thank you for the detailed review - having read the 
 whole draft several times, I know that ones eyes can start to glaze over on 
 what seems like something almost as long as the NFS spec ... so thanks for 
 the review. 
 
Not sure I would say 'it was my pleasure' but it certainly taught me a
thing or two!

 I did want to comment on the one major issues 
 
  
  
  Major issues: 
  Can we accept the code as normative?  If not how do we proceed?
 
 RFC 6569 says that the code needs to be the normative specification so
 I think this issues is pretty much resolved by that RFC. 
 
 As a bit of irrelevant history - this topic was discussed at various
 stages. If was discussed in the chartering process -
 draft-valin-codec-guidelines referred to by the charter said code
 would be normative. I don't mean by this that the charter said the
 code had to be normative but just that this conversation goes back to
 before the WG was formed. It was later discussed in the WG and
 resulted in WG consensus to having the code as normative. Just as
 background on a few of the reasons that this was decided this way,
 many people felt that the spec would be much longer, and much harder
 to implement or review if the text was normative. Code is a very
 compact representation of what happens on boundary edge conditions and
 eliminates many types of misinterpretations. I do understand normative
 code introduces other types of issues but it is a fairly common
 practice in specifying codecs to use normative code.
 
 Cullen Codec Co-Chair

I don't have a problem with this in principle: however as a reviewer I
get this nagging feeling that on a few days acquaintance, its impossible
to demonstrate that the text accurately, albeit non-normatively
describes the code.  And that makes me feel I have done a half job.
However, I also know that starting from scratch it would take me several
months to get anywhere near an accurate view (I know from considerable
experience with the DTN2 reference implementation and years ago the
source code of yacc - now that ages me!) 

If the wg, doc shepherd and the IESG are happy that the mapping is near
enough, so be it.  And, sorry, I didn't look at RFC 6569 during my
review.. probably shoyuld have done.

Regards,
Elwyn
 
 
 
 
 
 
 



Gen-art last call review of draft-ietf-codec-opus-12.txt (completed)

2012-05-14 Thread Elwyn Davies
I am the assigned Gen-ART reviewer for this draft. For background on 
Gen-ART, please see the FAQ at 
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq. 

Please resolve these comments along with any other Last Call comments 
you may receive. 

Document: draft-ietf-codec-opus-12.txt
Reviewer:  Elwyn Davies
Review Date:  14 May 2012 (completed)
IETF LC End Date: 10 May 2012
IESG Telechat date: (if known) -

Summary: 
Before offering some views on the document, let me say that this piece
of work seems to be a tour de force on behalf of its developers.  It is
certainly one of the (if not the) most technically complex pieces of
work that has been presented to the IETF, and is far more mathematically
complex and rigorous than our usual run of standards.  It is also
perhaps a vindication of the rough concensus and running code
philosophy. So congratulations to the authors and the companies that
have supported this work.  But back to the review

I came to this review with a very outdated view of what goes on inside
codecs, so it was rather a shock to the system.  Taking that into
account, I think that some additional high level, up front description
of the two parts (SILK and CELT) and the range encoding system would
make it easier for future (naive) readers and potential implementers to
understand what is going on.  For example, after struggling with the
description of CELT in the decoder (s4.3) I found that going off and
reading the slides on CELT presented at IETF 79 helped considerably.
Such additions might also help future dissemination of the technique by
giving potential users a quick overview.  It would also make it easier
to justify the decision to postpone the high level (and highly
mathematical/technical) view to section 5 after the detailed description
of the decoder.

I also found that the descriptions of the SILK and CELT decoders
appeared to be written with a different perspective (see detailed
comments) doubtless by different authors.  This is not ideal and,
despite the expected further increase in page count, some additional
text in s4.3 seems desirable.

By far the most difficult to parse section is 4.3.3 talking about bit
allocation in CELT.  Despite considerable study, I didn't feel I had
really got to grips with how this worked.  An example might help.

Finally, the most contentious aspect of this document is the requirement
to treat the code as normative.  There are just over 30,000 physical
lines of code and I haven't checked them hardly at all.  Slocount
reckons this represents 7.14 man years of effort.  As with the document,
there is a discrepancy between CELT and SILK with the latter code being
more heavily commented, especially as regards routine parameters.  A
proper validation of the claim that the code implements the description
would take several weeks of time: I guess that we have to take the
document shepherd's assurances on this.  One issue is that both code and
document are pretty much saturated with what we used to call 'magic
numbers'.  Although these are explained in the document, it does not
appear that this is always the case in the code.  I would also be
happier if the code contained Doxygen (or similar) dcoumentation
statements for all routines (rather than just the API).

So overall, the work is something that ought to be standardized but the
document needs further work - not quite ready for the IESG. 

Major issues: 
Can we accept the code as normative?  If not how do we proceed?

Minor issues:
Contrast between decoder descriptions of LP part and CELT part:  The
SILK descriptions go into gory detail on the values used in lots of
tables, etc., whereas the CELT part has a very limited treatment of the
numeric values used (assuming reliance on finding the values in the
reference implementation, either explictly or implicitly).  There are
things to be said for both techniques.  I was wondering (while reading
the SILK description) if the authors have any means of automatically
generating the tables from the code in the SILK part (or vice versa) to
avoid double maintenance. On the other hand, there are pieces of the
CELT decoder description (especially in s4.3.3 where knowing numbers of
bands, etc.) where some actual numbers would help comprehension.

s2 (and more generally):  The splitting of the signal in the frequency
domain into signal (components?) below and above 8kHz in the hybrid case
presumably requires that the output of the CELT encoder is windowed so
that only one of encoders gnerates output below 8kHZ.  I think something
is needed in s2 to explain how this is managed (presumably to do with
energy bands?).  I didn't find anything in s5 about what has to be done
for the encoder when running in hybrid mode which surprised me somewhat.

s4.1: Despite having found a copy of the range coding paper and tried to
read it, I found the description of range coding opaque (there are some
more words later in s5 but this is a bit late for understanding the
decoder

Re: watersprings.org archive of expired Internet Drafts

2011-10-10 Thread Elwyn Davies

Hi.

I don't know who was responsible for the Watersprings archive, but I 
think we should send whoever it was a vote of thanks for providing this 
(free) resource during all the years that the IETF was not able or 
willing to provide it.


So THANK YOU!  It was extremely useful.

But I am now quite happy with the IETF draft archive and I have a couple 
of customized Firefox search entries that minimize the amount of typing 
needed.


Regards,
Elwyn

On 10/10/2011 10:23, t.petch wrote:

 Original Message -
From: Julian Reschkejulian.resc...@gmx.de
To: t.petchdaedu...@btconnect.com
Cc: Frank Ellermannhmdmhdfmhdjmzdtjmzdtzktdkzt...@gmail.com;ietf@
ietf.org
Sent: Saturday, October 08, 2011 3:07 PM



On 2011-10-08 09:20, t.petch wrote:

If I'm looking for an internet draft where I only know parts of the name I
usually use a search engine; that's what they are for.
With the current flavour of the IETF web site, I usually go via charters -

WG -

I-D list and then find 103 I-Ds in an order I cannot divine, give up and

accept

that I will have to type in
d r a f t - i e t f - w g etc etc. Another waste of my time along with gif
download, xml processing etc oh, did I mention all the javascripts that try to
out think me and get in the way?  mutter mutter
...

What does XML have to do with all of this?

Julian

On a thread on this list some time ago, IANA reported progress in converting
their web site to XML and at the same time, apologised for how long it now takes
to access the Port Registry.  Having accessed it - a good chance to complete The
Times crossword! - I found an XML file in excess of 1Mbyte on my workstation.
Making a wild leap of imagination, I guessed that the time it took to access the
web page was due, at least in part, to these multi-megagbytes of XML, but I
could be wrong.

Tom Petch

Best regards, Julian




___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



--
The Cambridge Oxfam Walk 2011 has happened. There will be another walk next 
year.  In the meantime please donate to Oxfam.
For more information, see http://www.oxfam.org.uk/get_involved/fundraise/walk/ 
and follow us on Twitter at http://twitter.com/CambOxfamWalk.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: watersprings.org archive of expired Internet Drafts

2011-10-10 Thread Elwyn Davies

On 10/10/2011 20:25, Andrew G. Malis wrote:

Very nice, thanks!!

On Mon, Oct 10, 2011 at 2:46 PM, Doug Bartondo...@dougbarton.us  wrote:

On 10/10/2011 07:17, Elwyn Davies wrote:

But I am now quite happy with the IETF draft archive and I have a couple
of customized Firefox search entries that minimize the amount of typing
needed.

https://addons.mozilla.org/en-US/firefox/addon/ietf-doc-fetch-73306/

You can type in an RFC number, or all/part of an I-D name.
There are five more specific search/get plugins in an email I just sent 
to the tools discuss mailing list.

It should be in the archive real soon now:
https://www.ietf.org/mailman/listinfo/tools-discuss

/Elwyn

--
The Cambridge Oxfam Walk 2011 has happened. There will be another walk next 
year.  In the meantime please donate to Oxfam.
For more information, see http://www.oxfam.org.uk/get_involved/fundraise/walk/ 
and follow us on Twitter at http://twitter.com/CambOxfamWalk.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Gen-art] Gen-ART review of draft-oreirdan-mody-bot-remediation-16

2011-10-05 Thread Elwyn Davies
Thanks Miguel.

Regards,
Elwyn

On Wed, 2011-10-05 at 15:40 +0200, Miguel A. Garcia wrote:
 I have been selected as the General Area Review Team (Gen-ART)
 reviewer for this draft. For background on Gen-ART, please see the FAQ at
 http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq
 
 Please resolve these comments along with any other Last Call comments
 you may receive.
 
 Document:  draft-oreirdan-mody-bot-remediation-16
 Reviewer: Miguel Garcia miguel.a.gar...@ericsson.com
 Review Date: 2011-10-05
 IETF LC End Date: 2011-10-21
 IESG Telechat date:
 
 Summary: The document is ready for publication as an Informational RFC.
 
 /Miguel
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Grey Beards (was [81all] Quick Meeting Survey)

2011-09-21 Thread Elwyn Davies
Time for the facial hair standard and ensuring that there is a proper 
three stage progression from provisional salt and pepper to full blown 
white out.


/Elwyn

Eric Burger wrote:

You all are just bragging you still have hair :-(

On Sep 21, 2011, at 12:55 AM, Melinda Shore wrote:

  

On 9/20/11 6:26 PM, Ronald Bonica wrote:


This reminds me that it has been a while since we took the last IETF grey beard 
photo. A few more of us have gone grey since then.
Maybe we should plan on another photo to be taken after the next Administrative 
Plenary.
  

Beardless, but back when I started participating in the IETF my hair
was nearly black.  Now I've gone completely grey.  Not trying to imply
causality, of course.

Count me in.

Melinda
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



  



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf
  


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art LC review of draft-ietf-pcn-cl-edge-behaviour-08

2011-06-10 Thread Elwyn Davies
I am the assigned Gen-ART reviewer for this draft. For background on 
Gen-ART, please see the FAQ at 
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments 
you may receive.

Document: draft-ietf-pcn-cl-edge-behaviour-08 
Reviewer: Elwyn Davies
Review Date: 10 June 2011
IETF LC End Date: 10 June 2011
IESG Telechat date: (if known) -

Summary:
In my opinion, there are a number of areas that need significant work
and at least one open issue (the stability question from s3.3.1) that
needs to be addressed before this document is ready for the IESG.

Major issues:
The draft contains partial definitions of two control protocols (egress
- decision point; decision point - ingress).  It does not make it
clear whether the reader is expected to get full definitions of these
protocols here or whether there will be another document that specifies
these protocols completely.  As is stands one could build the protocols
and pretty much guarantee that they would not be interoperable with
other implementations since message formats are not included although
high level specs are.  The document needs to be much clearer about what
is expected to happen here.
 
Use of EXP codepoint: My understanding of what is said in RFC 5696 is
that EXP is supposed to be left for other (non=PCN) systems to use.
This draft uses it.  Is this sensible? Is this whole draft experimental
really?

s3.3.1:
 [CL-specific] The outcome of the comparison is not very sensitive
   to the value of the CLE-limit in practice, because when threshold-
   marking occurs it tends to persist long enough that threshold-
   marked traffic becomes a large proportion of the received traffic
   in a given interval.
This statement worries me.  It sounds like a characteristic of an
unstable system.  If the value is that non-critical why are we
bothering?

Minor issues:
s1.1: definition of PCN-Traffic etc:  
 The same network will carry traffic of other Diffserv BAs.
Just to be sure: Does this or does this not imply that *all* traffic in
a PCN network must have a non-empty DSCP marking, i.e. that *all*
traffic must be attached to some specific Diffserv BA? This should be
clarified whichever is true. 

s1.1: T-fail:  I notice from s3.1 that PCN-ingress nodes also have to
make reports on request.  Should T-fail or some other timer apply to
non-return of info from ingress points?  What would a (probably
non-colocated) decision point do if it lost contact with the ingress? 

s2/s3.2.1: The use of PM and EXP codepoints for ThM and ETM appear to be
reversed in these two sections!!  Which way round is intended?

s3.2.1/s3.2.2:  Neither section mentions T-meas but I assume that this
is supposed to be (either or both) the sampling period in the egress
node or the period between reports.  It is unclear if they are allowed
to be different and if they are which one is T-meas.  However s3.2.3
appears to imply that T-meas is probably the time between reports.  This
all needs to be much clearer.

s3.2.1/3.2.2: In s3.2.2, para 2:
 If so configured (e.g., because multipath routing is
being used, as explained in the previous section), the PCN-egress-
node MUST also report the set of flow identifiers of PCN-flows for
which excess-traffic-marking was observed in the most recent
measurement interval.
This is a requirement for a protocol that you may or may not be
defining. Confusing.

s3.2.3/s3.2.2: The first paragraph of s3.2.3 suggests that the report
from an egress may not always contain the calculated value of the CLE,
but s3.2.2 has a MUST for the report to contain this value.
Consistency!!!

s6:  The potential introduction of a centralized decision point appears
to provide additional attack points beyond the architecture in RFC 5559.
It appears to me that the requests for information about specific flows
to the ingress are ighly vulnerable as they (probably) contain all the
information needed to craft a DoS attack on the flow.

Nits/editorial comments:
General: Consistency of naming for timing paramters t-meas/T-meas, etc.

s1.1: I think it would be worth reproducing the CL-specific definitions:
PCN-threshold-rate and threshold-marked since they are specific.

s1.1: 
 Congestion level estimate (CLE)
   A value derived from the measurement of PCN-packets received at a
   PCN-egress-node for a given ingress-egress-aggregate, representing
   the ratio of marked to total PCN-traffic (measured in octets)
^ ^^
   received over a short period.
The ratio is (hopefully) dimensionless.  Maybe '(each measured in octets)' ?

s2:
 the PCN-domain satisfies the conditions specified in [RFC5696];
This may be a bit pedantic but I am not sure that RFC 5696 actually sets
out conditions for the domain.  It sets out rules for encoding markings
and allowed transitions.  Maybe s/conditions/packet markings and allowed

Gen-art review of draft-lear-iana-timezone-database-03

2011-04-22 Thread Elwyn Davies
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-lear-iana-timezone-database-01.txt
Reviewer: Elwyn Davies
Review Date: 22 April 2011
IETF LC End Date: 9 May 2011
IESG Telechat date: 12 May 2011

Summary:
Almost ready for the IESG.  This is my second review of the document.  

I suggested in the previous review that it might make life easier, particularly 
if an appeal was ever entered, if the document didn't use the RFC 5226 
Designated 
Expert mechanism but defined the role separately.  This hasn't happened but the 
distinction is now clearer.  To make it quite clear I would be inclined to add 
'except as regards appeals against decisions of the Designated Expert 
(see Section 5)' after [RFC5226] in the definition of TZ Coordinator in Section 
2.

Otherwise there are a couple of editorial nits.   

.
Nits/Editorial:
s3: s/policy policy/policy/ (repeated word)
s8, first para: s/filling/filling the role/ (maybe 'post')
s8, last para: s/TZ Coordinators/TZ Coordinator/
s10: s/Elwin/Elwyn/ (thanks for the ack!)

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-lear-iana-timezone-database-01

2011-01-12 Thread Elwyn Davies
I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-lear-iana-timezone-database-01.txt
Reviewer: Elwyn Davies
Review Date: 11 January 2010
IETF LC End Date: 11 January 2011
IESG Telechat date: (if known)

Summary:
This document is not quite ready for the IESG.  The appeals process (if
there is to be one) needs to clarified as it currently points indirectly
to a hole in RFC 5226. As explained below, I have a feeling that it
would be wise to avoid tying the processes in this document to the
Designated Expert processes in RFC 5226 despite the similarities.
Making it clear what does apply and what doesn't is probably more work
than doing it from scratch in this document, especially given the hole
in RFC 5226.

Major(ish) issue:
s4: 
 As RFC-5226 states, the IESG is not a
normal avenue for appeals of specific decisions of the coordinator,
but rather a last resort when a coordinator is thought not to be
functioning in an appropriate way.

I think the draft should make it explicit that it is referring to the
'Designated Expert' sections in RFC 5226 here if it continues to
reference RFC 5226 - although there is a clear relationship with
Designated Experts, the differences between the selection process and
the operations of the TZ Coordinator and generic Deisgnated Experts may
mean that citing RFC 5226 might lead to legalistic disputes about which
set of rules applies.  Also, I am unable to find statements in RFC 5226
backing up the sentence above.  Regrettably, RFC 5226 appears
effectively to have a 'dsngling reference' in this area. Section 3.2,
para 3 of RFC 5226 points at Section 5.2 which (allegedly) discusses
'disputes and appeals in more detail'.  However s5.2 is titled 'Updating
Registrations' and says nothing about appeals and disputes.  Section 7
of RFC 5226 covers appeals of IANA decisions but says nothing specific
about appealing designated expert rulings.  I think this area may need a
little more work.  Overall, my inclination would be to make this a
standalone document that does not try to partially modify the RFC 5226
Designated Expert process and operations.  Appeals... *sigh*.  

Minor Issue:
s3, para 3: Is it intended that that the supporting info should also be
signed?  If so the order of the phrases should be reversed.


Nits/Editorial:
s3:  'tar files' is jargon. s/tar files/archive files/ maybe adding in
the format used by the 'tar' program.

s4, last para: s/may/MAY/
s4, last para: 'OR MORE' - this isn't RFC 2119 language - is there any
real need for capitalization?

s5: The three instances of 'shall' ought to to be RFC 2119 terms:
s/No change shall be made to licenses, where they exist./Licenses, where
they exist SHALL NOT be changed./
s/IANA shall allow for the downloading of this reference code.  The
reference implementation shall be distributed/IANA SHALL allow for the
downloading of this reference code.  The reference implementation SHALL
be distributed.../

s7: Arguably the various 'will's and 'may' in the later part of the
section (from 'The IANA will provide' onwards) should be capitalised as
RFC 2119 requirements: s/will/SHALL/ (5 places) and s/may/MAY/.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Question about Prague

2010-12-31 Thread Elwyn Davies
On Fri, 2010-12-31 at 12:52 -0500, Marshall Eubanks wrote:
 On Dec 31, 2010, at 1:41 AM, Fred Baker wrote:
 
  
  On Dec 30, 2010, at 1:09 PM, Robin Uyeshiro wrote:
  The GPS in the rental car (rented in Munich) did not have the street
  information for Prague.
  
  It's not unusual, or at least it wasn't in 1997, for German rental agencies 
  to not permit driving to the Czech Republic. As stated, my information is 
  dated. The point is - check your contract.
  
 
 Before the Czech lands entered the EU (2004) that was very common, and very 
 strict. (In 1999 I was almost arrested for trying to drive my Hertz car to 
 the duty-free shop at the border crossing in Linz, Austria - by the 
 Austrians! - because my rental contract didn't allow for the Czech Republic.) 
 Now, you should tell your rental agency where you are going, but the last 
 time I rented a car and drove to Prague, we didn't have any issues at all. 
 There shouldn't even be a border post any more (since December 2007, the 
 Czech Republic has been part of the Schengen area).
 
 Regards
 Marshall 

Driving into the Czech Republic shouldn't be a problem BUT you do have
to tell the rental agency in advance and they will make a supplementary
charge per day for the whole contract (not just the days you are out of
Germany) if my recent experience is anything to go by (hire in Austria,
drive to Slovenia).  Its not particularly cheap either.

Regards,
Elwyn
 
 
  ___
  Ietf mailing list
  Ietf@ietf.org
  https://www.ietf.org/mailman/listinfo/ietf
  
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-art LC review of draft-cheshire-dnsext-nbp-09.txt

2010-12-15 Thread Elwyn Davies

On Tue, 2010-12-14 at 18:19 -0800, Stuart Cheshire wrote:
 On 23 Nov 2010, at 7:15 AM, Elwyn Davies wrote:
 
  Summary:
  This document has at least one open issue that I believe needs  
  fixing, either by altering the scope of the applicability of the  
  solution or fixing the requirements.  The requirements envisage a  
  protocol that could be used in an enterprise environment but it  
  does not address issues of visibility and accessibility.
 
 The document describes AppleTalk NBP, and what would be required in  
 an IP-based equivalent. It does not claim to document all possible  
 requirements of all possible service discovery protocols.
The second sentence is certainly true.  My comments do not seek ocean
boiling.  OTOH the document seeks to be not just an equivalent for
Appletalk NBP but a specifically zero-configuration related service
discovery protocol running over IP and explicitly targeting enterprise
as well as (generally simpler) domestic type environments.  Not being an
enterprise network manager these days, I don't know what their hot
buttons are in respect of service visibility but I do know that
controlling visibility may be a factor.   
 
  This issue is clearly related to the security requirements that  
  have been discussed elsewhere but differs from the authentication  
  and general authorization aspects that have been the focus there.   
  I believe that there needs to be discussion of how the service  
  discovery can be controlled so that individual users/machines are  
  only informed of services that they might be allowed to use.
 
 The document describes AppleTalk NBP, and what would be required in  
 an IP-based equivalent. AppleTalk NBP would find you (for example)  
 all file servers on the network, not all file servers for which you  
 know the password. We do not believe it is feasible in general to tie  
 service discovery to access control. Nor is it useful: Discovering  
 there's a printer for which you do know the password allows you to  
 ask someone for the password. Discovering only resources to which you  
 already have access (and therefore probably already know about) is  
 significantly less useful.
A paranoid (but literate) network manager will ask 'useful to whom'?
Being able to determine all the resources available on the network with
limited authorisation may not be seen as the most desirable situation.

But I leave it to those with more current experience in this area to
determine whether this is a genuine hole in the requirements.

Regards,
Elwyn
 
  Nits:
  [refreshingly free of nits!]
  The only comment might be that a pointer to some publically  
  available definition or discussion of the existing Appletalk NBP  
  miight be helpful if such a thing exists.
 
 There is not, which is why I wrote this document.
 
  Also idnits suggests that RFC 2462 should be replaced by RFC4862  
  which obsoleted it.
 
 Fixed.
 
 Stuart Cheshire chesh...@apple.com
 * Wizard Without Portfolio, Apple Inc.
 * www.stuartcheshire.org
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-csi-send-name-type-registry-03

2010-05-14 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.

Document:draft-ietf-csi-send-name-type-registry-03.txt
Reviewer: Elwyn Davies
Review Date: 14 May 2010
IETF LC End Date: 14 May 2010
IESG Telechat date: (if known) -

Summary:
Probably not ready. There seems to be a conflict or confusion between the 
prescriptive specification of a single algorithm for how the Subject Key 
Identifier has to be created in this document and the permissive specification 
in RFC 5280 that allows any suitable algorithm.  Either this specification will 
only deal with certificates that use the chosen SHA-1 hash or this 
specification is unnecessarily restrictive.  There are also a a few (related) 
minor issues and nits.

Major issues:
s3/s3.1: There seems to be some confusion here.  Section 4.2.1.2 of RFC 5280 
does not specify a unique method for encoding the Subject Key Identifier 
extension and there doesn't appear to be any method of finding out what method 
was (allegedly) used to generate the Subject Key Identifier.  S3 specifies that 
the SEND TA option has to carry the Key identifier in a specific one of those 
forms (#1 in RFC 5280). S3.1 specifies that the TA option carries the value 
from the SKI extension (without knowing whether that field is the SHA-1 form or 
some other). It appears that this document is placing a restriction on the 
algorithm used to generate the SKI extension value, but without saying this 
explicitly.  This all seems a bit of a mess.. or am I missing something? 
Presumably the reason for the DER-encoding cruft is to facilitate simple 
comparison.

Minor issues:
s3/s3.1: Is the 'Key Identifier' described here sent as the value of the 'Name' 
field in the TA option?  If so, say so.  Otherwise explain what is in the Name 
field in this case and where the Key Identifier fits in.

s3: Needs a reference to specify how to do DER-encoding of ASN.1 (and DER needs 
expanding).

Nits/editorial comments:
Abstract: s/This document request to IANA/This document is a request to IANA 
for the/

s2, para 1: s/to certify a router authority/to certify a router's authority/.
s/for NDP/for the NDP/, 
s/This document request to IANA/This document is a request to IANA for the/

s2, para 2: s/the certificates are declared/the certificates ia declared/

s3: It would be clearer if the line starting '3 SHA-1' was indented a bit and 
the description separated so that it doesn't sit under the 'Name Type' header.
Something like:
   Name TypeDescription

   3SHA-1 Subject Key Identifier (SKI)

s4, last para: s/is through/require/; there should be a reference to RFC 5226.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


[Gen-art] Gen-art review of draft-ietf-ipsecme-ikev2bis-08.txt

2010-05-04 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-ipsecme-ikev2bis-10.txt
Reviewer: Elwyn Davies
Review Date: 4 May 2010
IETF LC End Date: 18 March 2010
IESG Telechat date: 6 May 2010

Summary:
When I reviewed this document at IETF Last call, I discovered that compared to
previous documents, it contains no mention of mandatory to implement
ciphersuites.  In a discussion with Paul Hoffmann, I was pointed at various
other RFCs that specify ciphersuites, and informed that the IESG and WG had
approved the current situation.  However it seems to me that somebody looking at
the IKE documents would be likely to come to this document first and would find
it difficult to locate the auxiliary documents without considerable effort (and
risk of missing some).  I continue to believe that f there is not to be a list
of appropriate ciphersuites here, there needs to be some pointers to places to 
look.

A number of my comments have been implemented, but there are quite a few that I
have seen no response to amd have not been implemented.  The list below
represents the remaining comments. I have left in a number of comments regarding
the cut off time (publication date of RFC 3406) for updating of registration
tables.  It strikes me that it would be relatively little work and quite helpful
to bring these tables up to date.

There are also a number of relatively minor points where items and processes are
explicitly not fully specified.  Thus could lead to annoying corners where
implementations are totally interoperable (e.g., what is the complete set of
'terminators' forbidden in IP_FQDNs?  What is an acceptable 'sort of' email
address/NAI on EAP?)

Finally there are a number of points where it is recommended that network
traffic needs to be limited but no concrete guidelines are given.  I think that
some sort of suggestions for the parameters to be applied (e.g., time constants,
number of repeats, backoff algorithm) would be desirable.

Major issues:

s3.3.4: The draft states that the list of mandatory to implement suites has been
removed due to evolution going too fast.  However there are effectively some
mandatory to implement suites; they are listed in other documents.  There should
be a way of finding them so that users and implmenters can find them easily.

Minor issues:
s1: At para 6 in s1 the draft states:
The first request/response of an IKE session (IKE_SA_INIT) negotiates
security parameters for the IKE SA, sends nonces, and sends Diffie-
Hellman values.
As a (not really) naive reader, I asked myself 'Why does this text suddenly
mention that we need to send nonces and Diffie-Hellman values?'  Looking back at
the text so far I realized that the text has not introduced the techniques that
it is going to use to establish the authenticated IKE channel etc. It is assumed
that readers know that as soon as D-H is mentioned we are talking public key
cryptography. A paragraph explaining the underlying ideas would be useful.

s1.2, last para:
Note that IKE_AUTH messages do not contain KEi/KEr or Ni/Nr payloads.
Thus, the SA payloads in the IKE_AUTH exchange cannot contain
Transform Type 4 (Diffie-Hellman Group) with any value other than
NONE.  Implementations SHOULD omit the whole transform substructure
instead of sending value NONE.
Does 'cannot contain' conflict with the 'SHOULD'? I am unclear what an
implementer would do if s/he chose to do otherwise than omit the transform
structure in the light of the previous statement.

s2.1, last sentence:
 The retransmission policy for one-way messages is somewhat different
from that for regular messages.  Because no acknowledgement is ever
sent, there is no reason to gratuitously retransmit one-way messages.
Given that all these messages are errors, it makes sense to send them
only once per offending packet, and only retransmit if further
offending packets are received.  Still, it also makes sense to limit
retransmissions of such error messages.
Does this need to be more precise?  Some explicit policy for restricting
retransmissions? Possibly in s2.21.4.

s2.3: Should there be some discussion of the interaction of rekeying of the
IKE_SA and windows?  Presumably a rekey message should not be actioned until all
previous messages have been responded to.  Likewise receiving a Message ID with
a sequence number bigger than that in the rekey message should be very suspect!
 Should the INVALID_MESSAGE_ID notification be sent in this case (and before or
after the rekey?)  There might be some knock on into s2.8 where rekeying is
discussed. And maybe into s2.25?

s2.4, para 2:
 The INITIAL_CONTACT notification, if sent, MUST
be in the first IKE_AUTH request or response

Re: Gen-art review of draft-ietf-ipsecme-ikev2bis-08.txt

2010-03-20 Thread Elwyn Davies


Paul Hoffman wrote:
 At 2:37 PM + 3/19/10, Elwyn Davies wrote:
   
 Not ready.  The document contains a lot of minor niggles and nits plus a 
 major item that I am not sure the IETF should support:  this is the removal 
 of all mention of mandatory to implement security suites from the document.  
 I appreciate the difficulty of keeping up to the minute, but it seems to me 
 that this is outweighed by the difficulty of guaranteeing interoperability.  
 If the security landscape is so unstable, we have a bigger problem perhaps.  
 Whether this change is acceptable to the IAB, the IESG and the wider IETF is 
 not something I can resolve.

 . . .

 Major issues:

 s3.3.4: The draft states that the list of mandatory to implement suites has 
 been removed due to evolution going too fast.  Is this acceptable?

 

 draft-ietf-ipsecme-ikev2bis is a revision of RFC 4306, and the paragraph in 
 question about removing the mandatory-to-implement suites is copied directly 
 from RFC 4306. When the original WG published RFC 4306 over four years ago, 
 it decided to split out the suites into what became RFCs 4307 and 4308. 
 draft-ietf-ipsecme-ikev2bis changes nothing here.

 Does that clear up your issue, or are you saying that 
 draft-ietf-ipsecme-ikev2bis should reverse the old policy and explicitly pull 
 in the text from RFC 4307 and RFC 4308 into the new document?

 --Paul Hoffman, Director
 --VPN Consortium

   
Neither.

The omly mention of mandatory to implement suites is in s3.3.4 where it
appears to imply (to praphrase) that mandatory to mplement has been 
removed because we can't keep up. This can be quite happily be read as
'removed to the bit bucket'. As it stands a naive reader might conclude
that he can't guarantee much at all since there are no pointers to where
the list  has been removed *to*. 

This is the master specification for IKE if I understand correctly.  It
had better say that there MUST always be some mandatory to implement
algorithms, but it is perfectly legitimate to hand of the listing of
those to some other RFC that is less onerous to update.  It would be IMO
a good idea (as is done with all the rafts of updateable lists) to link
to the starting points of the chain of documents that tells an
implementer what are currently the required  protocols by referencing
RFC 4307 and RFC 4308, but again reminding us that there maybe heirs and
successors.

So easy enough to solve.

Regards
Elwyn


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-ipsecme-ikev2bis-08.txt

2010-03-19 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-ipsecme-ikev2bis-08.txt
Reviewer: Elwyn Davies
Review Date: 18 March 2010
IETF LC End Date: 18 March 2010
IESG Telechat date: (if known) -

Summary:
Not ready.  The document contains a lot of minor niggles and nits plus a major 
item that I am not sure the IETF should support:  this is the removal of all 
mention of mandatory to implement security suites from the document.  I 
appreciate the difficulty of keeping up to the minute, but it seems to me that 
this is outweighed by the difficulty of guaranteeing interoperability.  If the 
security landscape is so unstable, we have a bigger problem perhaps.  Whether 
this change is acceptable to the IAB, the IESG and the wider IETF is not 
something I can resolve.

One niggle that I felt represented a rather lackadaisical approach, was the 
retaining of the publication date of RFC 4306 as a frozen point in time for the 
purpose of documenting the state of the world as regards lists of configurable 
lists.  I would have preferred the losts to be up to date at the publication of 
*this* RFC.

There are also a number of relatively minor points where items and processes 
are explicitly not fully specified.  Thus could lead to annoying corners where 
implementations are totally interoperable (e.g., what is the complete set of 
'terminators' forbidden in IP_FQDNs?  What is an acceptable 'sort of' email 
address/NAI on EAP?)

Finally there are a number of points where it is recommended that network 
traffic needs to be limited but no concrete guidelines are given.  I think that 
some sort of suggestions for the parameters to be applied (e.g., time 
constants, number of repeats, backoff algorithm) would be desirable.

Major issues:

s3.3.4: The draft states that the list of mandatory to implement suites has 
been removed due to evolution going too fast.  Is this acceptable?

Minor issues:
s1: At para 6 in s1 the draft states:
The first request/response of an IKE session (IKE_SA_INIT) negotiates
security parameters for the IKE SA, sends nonces, and sends Diffie-
Hellman values.
As a (not really) naive reader, I asked myself 'Why does this text suddenly 
mention that we need to send nonces and Diffie-Hellman values?'  Looking back 
at the text so far I realized that the text has not introduced the techniques 
that it is going to use to establish the authenticated IKE channel etc. It is 
assumed that readers know that as soon as D-H is mentioned we are talking 
public key cryptography. A paragraph explaining the underlying ideas would be 
useful.

s1.2, last para:
Note that IKE_AUTH messages do not contain KEi/KEr or Ni/Nr payloads.
Thus, the SA payloads in the IKE_AUTH exchange cannot contain
Transform Type 4 (Diffie-Hellman Group) with any value other than
NONE.  Implementations SHOULD omit the whole transform substructure
instead of sending value NONE.
Does 'cannot contain' conflict with the 'SHOULD'? I am unclear what an 
implementer would do if s/he chose to do otherwise than omit the transform 
structure in the light of the previous statement.

s2.1, last sentence:
 The retransmission policy for one-way messages is somewhat different
from that for regular messages.  Because no acknowledgement is ever
sent, there is no reason to gratuitously retransmit one-way messages.
Given that all these messages are errors, it makes sense to send them
only once per offending packet, and only retransmit if further
offending packets are received.  Still, it also makes sense to limit
retransmissions of such error messages.
Does this need to be more precise?  Some explicit policy for restricting 
retransmissions? Possibly in s2.21.4.

s2.2: Maybe should mention that retransmissions MUST use the same Message ID.

s2.3: Should there be some discussion of the interaction of rekeying of the 
IKE_SA and windows?  Presumably a rekey message should not be actioned until 
all previous messages have been responded to.  Likewise receiving a Message ID 
with a sequence number bigger than that in the rekey message should be very 
suspect!  Should the INVALID_MESSAGE_ID notification be sent in this case (and 
before or after the rekey?)  There might be some knock on into s2.8 where 
rekeying is discussed. And maybe into s2.25?

s2.4, para 2: 
 The INITIAL_CONTACT notification, if sent, MUST
be in the first IKE_AUTH request or response, not as a separate
exchange afterwards; receiving parties MAY ignore it in other
messages.
What should receiving parties do if they *do* receive it and *don't* ignore it? 
Since it 'MUST be sent in the first IKE_AUTH' receiving at any other time is a 
protocol error and should cause some response (like dropping

Gen-art review of draft-ietf-dhc-dhcpv4-vendor-message-01

2010-02-05 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-dhc-dhcpv4-vendor-message-01.txt
Reviewer: Elwyn Davies
Review Date: 5 February 2010
IETF LC End Date: 17 February 2010
IESG Telechat date: (if known) -

Summary: Almost ready.  I note that (AFAICS) the existing DHCPv4 
standards do not specify the behaviour of clients and servers receiving 
message types that they do not understand.  Several new message types 
have been defined since RFCs 2131 and 2132 were published.  These 
standards and this document tacitly assume that reception of these new 
message types by existing clients or servers will not cause damage 
(relays should just forward them without problem).


Major issues:
None

Minor issues:

s3, para 3: This paragraph contains weasel words about 'good networking 
practices' that 'MUST be used'.  This is untestable as it stands.  Is 
this anything more than dealing with non-replies, not flooding the 
network with repeats and not hanging up if the partner never does 
answer?  Also, as observed above, servers or clients that do not (yet) 
implement this capability do not have a defined behaviour when receiving 
this new type of message.  There is a tacit assumption that they will be 
silently dropped without causing any problems.


s7 and s4, next to last para: s4 specifies RFC 3396 as 'MUST support'  
This makes RFC 3396 a normative reference, not informative.  Arguably  
the last para of s4 makes RFC 3925 normative as well.


Nits/editorial comments:
s4, top of page 5: 'Option codes 0 and 255 have no pre-defined 
interpretation or format':  This comment (duplicated from RFC 3925) is 
confusing to the uninitiated reader.  If I understand correctly, this is 
intended to contrast with the 'basic' options in DHCPv4 where options 0 
and 255 are 'special' - i.e. no length code.  I suggest adding at the 
beginning of the sentence: 'Unlike option codes in DHCPv4 [RFC2131], 
option codes 0...'.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: XML2RFC must die, was: Re: Two different threads - IETF Document Format

2009-07-05 Thread Elwyn Davies

Carsten Bormann wrote:

What we need is the ability to write drafts with a standard
issue word processor.


Why?  I suppose if there were indeed a *standard* word processor, 
this might

be feasible, but I think by standard issue you mean commercially
available.


http://www.xmlmind.com/xmleditor/

Commercial, and the personal edition is available at no cost.
I've gotten non-CS people up to speed on that tool in no time.

Best with:
http://code.google.com/p/xml2rfc-xxe/

+1

This is my preferred mechanism (thanks to Bill Fenner).  It isn't 
totally perfect but it makes it very difficult to produce invaliud xml 
and does give you a good idea of what you will get.


One colleague has had problems due to exploiting (or maybe just not 
getting caught by) some of the laxities in earlier versions getting 
tightened up later, but it is generally easy enough to fix things up.  
Bill's verifier is very helpful for this purpose.

http://www.fenron.com/~fenner/ietf/xml2rfc-valid/

As regards documentation, there are two sets of tutorial slides (maybe 
could be described as 'basic' and 'intermediate' - I wrote the latter).  
The FAQ is very useful and there are several templates, including the 
one I did to accompany the tutorial I did.  This has lots of explanatory 
text in it with many examples - there is a stripped down version for 
when you are experienced. These all fill in the holes left by the basic 
documentation IMHO, including the complete list of PIs and what they do.

http://xml.resource.org/xml2rfcFAQ.html

Regards,
Elwyn






(But then, I use Emacs, which is non-commercial and free.)

Gruesse, Carsten

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Update to the IETF Web Site

2009-06-24 Thread Elwyn Davies
I agree with this point.  It would also be good to have 'parent' links 
on these sub-pages.
I note that the same problem occurs if you select the 'Brief' option on 
the menu.
[Q: will the 'customize view' be something one can select on startup 
(e.g. by a ?string in the URL)? - I am not sure how useful the different 
versions are if you have to decide to go to brief (for example) by an 
extra mouse click.  If I like that

style it would good for me to bookmark the style.]

(More points below)

Dearlove, Christopher (UK) wrote:

I asked a colleague who is not involved in the IETF for a
comment, to see how it passed test 1 below. His first
reaction was positive. But then we noticed a problem.

He's running Firefox with noscript. He gets a simplified
version of the left hand bar - no subentries. And there
is no indication to him he was missing links, and even
when he, say, clicks on About the IETF, the page below
doesn't have substitutes for the missing Mission,
Standards Process and Note Well links (which I think
it should - I haven't checked the other similar cases).

He, and I, don't see any reason why this should be script
generated - or if the alternative views is seen as so
important (I'm not sure why) why the noscript version
doesn't show all information.

  

Additional points:

NOMCOM:  Only appears on the Home 'at a glance list' and not in the 
menus  -  A set of 'other bodies' menu links would probably be useful 
with Nomcom, iaoc, rfc ed, tools team, edu team (etc)


Various things irritated me about the left hand menu:
- The style is very inconsistent between pages at present.. maybe this 
will be fixed in due course (e.g. data tracker pages have a different 
menu style and colour, tools site is different, wikis are different).  
IESG pages are not all the same.
- The change of style for the 'advanced' menu seems rather gratuitous at 
present (I don't see anything new in the way of access methods etc. ).  
I am unclear that  four choices is really essential.
- Using Firefox v3.0.11 the aesthetics of the display of the menu are 
rather horrid in some cases (I think this is to do with first visits to 
a page)  - The menu first displays with some large blocks with the upper 
level titles in white on larger deep blue boxes (if I can hold the flash 
in my mind correctly) before redisplaying in its final form.  This is 
unpleasing.
- Is it deliberate that the top level links don't change colour after 
you have visited them whereas subsidiary and on-page links do?  I don't 
know that colour change is really useful for the menu.. but actually I 
found the menu more pleasing and helpful with the 'visited' colour 
scheme (i.e. top level links in dark blue, sublevel links in red/brown).


Overall: The main page had a terribly cluttered feel to it.  I would 
prefer more white space and the logo writ large.  Provide the 'At a 
glance' page as a site map on a separate page - after all it mostly (but 
of course not quite) just duplicates the menu at the moment.


The direct links to the RFC Editor site don't fit in very well because 
of the different style.. yes they are useful but psychologically they 
should be clearly distiguished by being in an external link category (or 
have their style brought into line).- the relationship between IETF and 
RFC Editor makes this all a bit strange.  And there is no menu to help 
you get back.. I believe you could display the RFC Editor site pages 
with the left menu still in place (Don't know the details but it is 
faniliar from shopping sites etc)


Similarly the direct displays of RFCs etc lose the menu so you can't 
navigate back other than by browser back button - not perhaps so much of 
a problem for say the RFC repository (although I would often find it 
useful). However, some pages take you to a display of an RFC by other 
routes (e.g the WG chairs page, MIB Review Guideleines displays RFC 
4181).   One solution for the repository would be a 'display in a 
separate tab/window' button as well the straight 'Go' (I can't right 
click to specify new tab/window).


There is still a learning exercise to be done when using the site: The 
menus do not contain all of the links that appear on the various 'at a 
glance' pages.  That means there are (slightly) hidden things  Maybe 
hanging all the 'at a glance' pages together into a directory/site map 
(maybe with next/previous links)  would make it clearer to be able to 
run through ALL the options when  you believe there is something there 
but *just can't find it* (like when I was trying to track down the 
nomcom link just now).


Regards,
Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-monami6-multiplecoa-10.txt

2008-11-25 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-monami6-multiplecoa-10.txt
Reviewer: Elwyn Davies
Review Date: 24 November 2008
IETF LC End Date: 17 November 2008
IESG Telechat date: (if known) -

Summary:
This document is almost ready for the IESG.  It has a number of minor
issues plus a fair number of editorial nits.

I am sending the editirial issues to the authors separately as there are
lots of acronyms needing expansion and minor english improvements that
woild be tedious to transcribe.

Apologies for the late review.

Comments:
Minor Issues:

Backwards compatibility:   It would be helpful to explain in the
introduction why this proposal is backwatds compatible with the RFC 3775
scheme.  The explanations are there but are buried in the error cases of
s5.7 and is easily mossed (as I did on early reading).

Extension to IPv4 correspondents etc: Something about this in the
ontroduction would also help.

s2 and several other places (s4.2, s5.1):  Use of zero as a binding ID
(BID) is forbidden.  It is unclear why this value is not allowed - it
does not AFAICS specify reversion to RFC 3775 behaviour or anything
similar:  Forbidding it seems gratuitous.

s2: Specifying that the BID must not be negative is sloghtly confusing
because the protocol is specified so that negative values cannot be carried.

s4.2 (two places), s6.2 (2nd bullet), s6.2 (6th bullet, 1st sub-bullet):
The length of the Binding Address mobility option for the IPv4 case is
specified inconsistently. Some places have been corrected from 12 to 8
but several others remain. 

s4.2: The Reserved fiels is normally specified as 'SHOULD be ignored by
the receiver'.  Makes it easier to cope with later changes.

s4.3 (MCOA NOTCOMPLETE) and elsewhere (s6.2):  I am dubious about the
non-transactional nature of bulk registrations:  some additional
discussion of why it should be reasonable that a bulk registration can
fail in part would be useful

s4.3 (MCOA MALFORNED): Some indoication of the circumstances under which
this can occur would be useful.

s4.3 (MCOA BULK REGISTRATION PROHIBITED) and s5.3:  I think there is a
'crner case' in which a bulk registration is sent to a leagcay RFC 3775
node:  the node would not be capable of this response.  This corner case
is not described in s5.3

s5.3: What error status is sent if the user has an Alernate care-of
address option with a bulk registration?

s5.5.2, last para: Arguably, if the interface is shut down the node os
not (IP) connected to its home link!

s5.6.3 (2nd bullet) and s6.1 (para 2): Using 'ex.' is not good:  It is
not a standard abbreviation.  I take it 'except' is meant.

s5.6.3 (3rd bullet):  'The mobile node SHOULD include the Link-layer
Address (LLA) Option': I do not understand how the home agent would be
able to send to the mobile node if the LLA option was omitted.  I think
this is a 'MUST' or maybe a 'needs to'.

s5.6.4 (2nd top level bullet): 'the home agent SHOULD use the link-layer
address carried by the Link Layer Address option':  Again I am not sure
what alternative there is?  Replace with either 'MUST' or 'needs to'.

s5.7 (2nd bullet): s/SHOULD/needs to/:  This is not something sthat is
an option in the protocol.  Also I think it should state that the mobile
node needs to assume that none of the attempted registrations were
successful.

s5.7 (3rd bullet): Explain what could cause the packet to be malformed.

s5.7 (4th bullet):  Replace 1st instance of SHOULD with 'needs to'. 
Explain that the 2nd case can occur during 'bootsatrpa' (pointer to s5.9).

s6.2 (para 2):  If bulk registrations are not transactional (which I
would have preferred) need to make it clear what happens with the
vrarious multiple mobility options when some are succcessful and some fail.

s6.2 (2nd bullet):  'When the Length value is either 8 or 20, the
care-of address MUST be present in the Binding Identifier mobility
option. If the valid care-of address is not present, the receiver MUST
reject the Binding Identifier mobility option and returns the status
value set to [MCOA MALFORMED].'  This is poorly phrased.  If the length
is set to 8 or 20, then there is space in the option for an address of
some sort.  It sort of implies that the bit pattern can be tested to see
if it is a valid address - how is this done?  It strikes me tht it would
simpler just to day that the address is ignored if present when not
required (or, if being paranoid, must be the same as was previously
registered (if present) when deleting a registration).

s6.2 (1st para after lost of bullets): s/can be omitted/MAY be omitted/

Editorial:
I have sent a Word document with many nits marked up to the authors.




___
Ietf mailing list
Ietf@ietf.org

Gen-art review of draft-ietf-monami6-multiplecoa-10.txt

2008-11-24 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-monami6-multiplecoa-10.txt
Reviewer: Elwyn Davies
Review Date: 24 November 2008
IETF LC End Date: 17 November 2008
IESG Telechat date: (if known) -

Summary:
This document is almost ready for the IESG.  It has a number of minor
issues plus a fair number of editorial nits.

I am sending the editirial issues to the authors separately as there are
lots of acronyms needing expansion and minor english improvements that
woild be tedious to transcribe.

Apologies for the late review.

Comments:
Minor Issues:

Backwards compatibility:   It would be helpful to explain in the
introduction why this proposal is backwatds compatible with the RFC 3775
scheme.  The explanations are there but are buried in the error cases of
s5.7 and is easily mossed (as I did on early reading).

Extension to IPv4 correspondents etc: Something about this in the
ontroduction would also help.

s2 and several other places (s4.2, s5.1):  Use of zero as a binding ID
(BID) is forbidden.  It is unclear why this value is not allowed - it
does not AFAICS specify reversion to RFC 3775 behaviour or anything
similar:  Forbidding it seems gratuitous.

s2: Specifying that the BID must not be negative is sloghtly confusing
because the protocol is specified so that negative values cannot be carried.

s4.2 (two places), s6.2 (2nd bullet), s6.2 (6th bullet, 1st sub-bullet):
The length of the Binding Address mobility option for the IPv4 case is
specified inconsistently. Some places have been corrected from 12 to 8
but several others remain.

s4.2: The Reserved fiels is normally specified as 'SHOULD be ignored by
the receiver'.  Makes it easier to cope with later changes.

s4.3 (MCOA NOTCOMPLETE) and elsewhere (s6.2):  I am dubious about the
non-transactional nature of bulk registrations:  some additional
discussion of why it should be reasonable that a bulk registration can
fail in part would be useful

s4.3 (MCOA MALFORNED): Some indoication of the circumstances under which
this can occur would be useful.

s4.3 (MCOA BULK REGISTRATION PROHIBITED) and s5.3:  I think there is a
'crner case' in which a bulk registration is sent to a leagcay RFC 3775
node:  the node would not be capable of this response.  This corner case
is not described in s5.3

s5.3: What error status is sent if the user has an Alernate care-of
address option with a bulk registration?

s5.5.2, last para: Arguably, if the interface is shut down the node os
not (IP) connected to its home link!

s5.6.3 (2nd bullet) and s6.1 (para 2): Using 'ex.' is not good:  It is
not a standard abbreviation.  I take it 'except' is meant.

s5.6.3 (3rd bullet):  'The mobile node SHOULD include the Link-layer
Address (LLA) Option': I do not understand how the home agent would be
able to send to the mobile node if the LLA option was omitted.  I think
this is a 'MUST' or maybe a 'needs to'.

s5.6.4 (2nd top level bullet): 'the home agent SHOULD use the link-layer
address carried by the Link Layer Address option':  Again I am not sure
what alternative there is?  Replace with either 'MUST' or 'needs to'.

s5.7 (2nd bullet): s/SHOULD/needs to/:  This is not something sthat is
an option in the protocol.  Also I think it should state that the mobile
node needs to assume that none of the attempted registrations were
successful.

s5.7 (3rd bullet): Explain what could cause the packet to be malformed.

s5.7 (4th bullet):  Replace 1st instance of SHOULD with 'needs to'.
Explain that the 2nd case can occur during 'bootsatrpa' (pointer to s5.9).

s6.2 (para 2):  If bulk registrations are not transactional (which I
would have preferred) need to make it clear what happens with the
vrarious multiple mobility options when some are succcessful and some fail.

s6.2 (2nd bullet):  'When the Length value is either 8 or 20, the
care-of address MUST be present in the Binding Identifier mobility
option. If the valid care-of address is not present, the receiver MUST
reject the Binding Identifier mobility option and returns the status
value set to [MCOA MALFORMED].'  This is poorly phrased.  If the length
is set to 8 or 20, then there is space in the option for an address of
some sort.  It sort of implies that the bit pattern can be tested to see
if it is a valid address - how is this done?  It strikes me tht it would
simpler just to day that the address is ignored if present when not
required (or, if being paranoid, must be the same as was previously
registered (if present) when deleting a registration).

s6.2 (1st para after lost of bullets): s/can be omitted/MAY be omitted/

Editorial:
I have sent a Word document with many nits marked up to the authors.





___
Ietf mailing list
Ietf@ietf.org
https

Re: [Gen-art] Gen-art review of draft-ietf-rmt-bb-fec-basic-schemes-revised-05

2008-10-31 Thread Elwyn Davies
This all seems fine to me.. I'll take a look at the next version when it 
appears.


No worries on the delay... you should see some of mine ;-)

/Elwyn

Mark Watson wrote:

Elwyn, all,

Please accept my apologies for the excessive delay in addressing these
comments. My plan for addressing these in the -06 draft is below.

Regards,

Mark


On 7/18/08 8:57 AM, Elwyn Davies [EMAIL PROTECTED] wrote:

  

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-rmt-bb-fec-basic-schemes-revised-05.txt
Reviewer: Elwyn Davies
Review Date: 18 July 2008
IETF LC End Date: 29 July 2008
IESG Telechat date: n/a

Summary:
Nearly ready for IESG.  A few minor issues mainly with failure to
specify encodings and a couple of corner cases. A few editorial nits
noted below.

Comments:

s3.2.1: Need to explicitly document the encoding used for SBNs (also
applies to s4.2.1 and s5.2.1. s5.2.1 also needs to specify encoding for
Source Block Length).



- Add a clarifying sentence in the introduction that all integer fields are
in network byte order.
- In the individual sections, specify that the fields are 'x-bit unsigned
integers' with suitable values of x.

  

s3.2.1, bottom of page 6/top of page 7: s/is processed at/to process the
block by/ (two places) (or some such .. it doesn't read well at present).



New sentence: The transport time of a source block includes the amount of
time needed to process the source block at the sender transport layer, the
network transit time for packets, and the amount of time needed to process
the source block at the receiver transport.

  

s3.2.2.2: need to explicitly state encoding of various values (unsigned
integers I assume). (also applies to s4.2.2.2, s4.2.2.3, s5.2.2.2



Ok. I will add a paragraph under each figure.

  

s4.2.2.3:  The case where the length is zero is a lttle odd!  I think it
would be worth explicitly stating that (either) the whole object is just
one octet long (or) it is four octets padded with zeroes.  The latter
case might make processing more consistent since otherwise the zero case
is special and the only case where the object is not four octet aligned.



Ok - I believe there are no users of this field at present so it is safe to
include the padding for four-octet alignment.

  

s5.1:  it is not possible to encode the source block length of 65536 in
16 bits unless 0 is overloaded to mean 2^^16.  This isn't specified. (I
assume 'at most' to be read as 'less than or equal').




The maximum size should be 65535.

  

Editorial:

Abstract:  Need to expand FEC at least once!
s1, 2nd para after bullets: genrally not recommended to mention WG
s1, last para: s/listed/are listed/
s3.2.1: Need to asociate Source Block Number and SBN explicitly (well, I
assume that is what SBN means!).
s3.4.1, next to last para: s/implementor of/implementor/
s3.4.2, lastpara: s/substracting/subtracting/
s4.4.2.2: I take the reference in the last para of the section (just
above Fig 4) should be to s3.2.2.2.



Actually it should be to the figure.

  

s10, 2nd bullet: s/th/the/
s10, 3rd bullet: s/sis/did/





___
Gen-art mailing list
[EMAIL PROTECTED]
https://www.ietf.org/mailman/listinfo/gen-art

  

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-stjohns-sipso-05.txt

2008-10-13 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-stjohns-sipso-05.txt
Reviewer: Elwyb Davies
Review Date: 12 October 2008
IETF LC End Date: 23 October 2008
IESG Telechat date: (if known)-

Summary:
There are a number of issues which I believe should be considered before 
this document is ready for the IESG.
One possibly major concern is the relationship with the corresponding 
IPv4 IPSO option as regards IPv4 over IPv6 and IPv6 over IPv4 tunnels. 
It may be that MLS systems explicitly forbid such situations, but if not 
this needs to be addressed.


I am aware that there has been extensive discussion on the IETF and SAAG 
lists of the impact of this option on the semantics of transport 
connections through its concept of virtual networks selected by 
Sebsitivity Label value. In my opinion the statements made in this 
document about the limited scope of usage for the CALIPSO option mean 
that the question of the effect on the wider Internet architecture is 
irrelevant. This could be reinforced by choosing '01' for the top two 
bits of the option type so that systems that don't understand the 
CALIPSO option are required to (silently) discard the labelled packets. 
There are certainly issues that arise as a result of the extension of 
the transport end point identfier to include the sensitivity label but I 
am assuming that the implementors of MLS systems have sufficient 
knowledge stemming from the corresponding IPv4 systems to provide a 
solution that does what is needed in the limited context they need to 
address. An IESG note on the applicability of this option would probably 
cover the case.


Likewise I will not revisit the discussions resulting from the secdir 
review on the use of the AH integrity checks.


Comments:
S5: Is there any need to specify an ordering constraint on where the 
CALIPSO option should appear in the hop-by-hop header?


S5, para 2: ‘normally contains’: I think what this means is that each 
hop-by-hop header should contain EXACTLY one CALIPSO option. If a 
datagram happens to contain multiple hop-by-hop headers then it might 
contain more than one. Be explicit!


S5, para 2: What about IPv4 in IPv6 and IPv6 and IPv4 tunnels? Is there 
some relationship between the IPSO/IPv4 security labels and CALIPSO/IPv6 
labels? I think maybe the draft needs some coverage of tunnel gateways 
as a special case of intermediate systems (or end systems - depending on 
how they are seen by the MLS community).


S5.1.1: It would be desirable to explain why the top three bits should 
be 000 (it is only done in the IANA section presently.)


S5.1.1/s9.1: The choice of option flags is rather at odds with the 
specification.
- The option specifies ‘continue processing’ but if the option should 
not escape onto to the global Internet (and ‘all systems’ in the private 
networks would be expected to understand CALIPSO options), it would 
surely be better to specifiy ‘drop if not understood’.
- The fact that translation can occur if there is no AH header is at 
odds with the ‘unchanged en route’ bit. One solution to this would be to 
ask for two option type values - one for use with AH and one without.


S5.1.7: The CRC-16 value is just a bit pattern rather than an integer.

S6.2.2/S6.3: ‘A datagram with a Sensitivity Label above the
permitted range MUST be dropped.’ In s6.2.2 this is not classified as a 
security fault but in s6.3 it is. Is there some significance in this 
difference?


S6.3.3, Item 3: ‘If an
unlabelled packet has been dropped because the
packet is required to be labelled, then a reason
code of Administratively Prohibited is used.

In all cases, if an ICMP Error Message is sent,
then it MUST be sent with the same Sensitivity
Label as the rejected datagram.’
Probably need to call out the special case of the unlabelled packet in 
the second paragraph here. It would also be useful to remind readers 
that the ‘same label’ ought to be OK for sending back out the incoming 
interface even though it is no good for the selected outgoing interface. 
I had to think about this for a while.


S6.3.3, Item 3, last para: The term ‘OFF’ is not clear here. One assumes 
it means ‘not enabled’ but it would be good to be explicit.


S6.4, para 5: Presumably the incoming DOI is also involved in the 
choice? At present it is purely on the standard IP parameters.


S9.2: ‘DOI values beginning with decimal 0:0:0 are reserved for
private use amongst consenting parties; values in this range
will not be allocated by IANA to any particular user or user
community. For reasons of interoperability, these DOI values
MUST NOT ever appear on the global public Internet.’
Er.. but these options are NEVER supposed to appear on the global 
Internet. Calling out this range specially 

Gen-art review of draft-ietf-sip-media-security-requirements-07

2008-10-10 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-sip-media-security-requirements-07.txt
Reviewer: Elwyn Davies
Review Date:  10 October 2008
IETF LC End Date: 13 October 2008
IESG Telechat date: (if known) -

Summary:
This document is almost ready for the IESG.  I have a couple of comments
and queries about the reasoning in a few of the requirements.
Meta-comment:  To a non-SIPper the problems to be solved and the
requirements look very challenging!  And to think S in SIP might once
have meant...
Disclaimer: Whilst the requirements appear sensible and internally
consistent, I have no idea if the set is complete or really appropriate.
The explanations in s4 are very helpful and clear for a naive reader
like me. Likewise, I do not have the necessary knowledge to verify the
statements in the various appendices relating to existing proposals.
Again they look reasonable sensible.

Comments:
s5.1, Requirement R-RTP-VALID:  I think some explanation of  why '...the key
negotiation packets MUST NOT pass the RTP validity check
defined in Appendix A.1 of [RFC3550].' would help.  This looks
like a magic incantation to me at present!

s5.1, Requirement R-NEGOTIATE:  'The media security key management
protocol MUST allow a SIP
User Agent to negotiate media security parameters for each
individual session.'   Does this imply that the protocol MAY
allow the SIP UA to use the same parameters for several sessiosn if it
wants to? Might be wise to be explicit.. but I may not understand the
situation.

s5.2, Requirement R-FIPS:  Whilst I know that the FIPS process is often
cited other than in the US, this requirement appears very US centric.
Are there other similar requirements from other countries that ought to
be considered?

s5.2, Requirement R-DOS:  Whilst I know that it is probably impossible
to guarantee that a given solution will not introduce some arcane DOS
opportunity that no one has thought of, it seems to me that 'MUST NOT
introduce any foreseeable (or, maybe, significant) new DoS
vulnerabilities' would be better than SHOULD NOT, which allows for
possible weaseling.

Nits:

s4.2, last line on p.9: s/ares/are/
sA.5.4, MIKEY-NULL bullet: s/computaional/computational/
idnits reports:
draft-ietf-sip-media-security-requirements-07.txt(1166): Line has weird
spacing: '...ication  along...'
Several references are now at later versions and
draft-ietf-msec-mikey-applicability has been published as RFC 5197.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-forces-model-14.txt

2008-09-05 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-forces-model-14.txt
Reviewer: Elwyn Davies
Review Date: 5 Setember 2008
IETF LC End Date: 8 September 2008
IESG Telechat date: (if known) -

Summary: Nearly ready for IESG. Generally this is a very well
constructed and written document dealing with a very complex problem.
There are quite a number of minor points that ought to be addressed
(although not vast fpr a 132 page document) plus a (largish) number of
editorial nits (of which many are related to highly inconsistent choice
of what to use for the singular form of metadata - metadata or metadatum
- in many cases both are used in the same sentence!) The other
consideration that needs to be addressed is the use of normative
language in s4 - this is discussed below.
Caveat: I haven't done detailed checks of the XML schema and the long
bits of XML.

Comments:

Minor Issues:
=

s2.3: States that the protocol can be used to discover the Inter-FE
topology: is what is meant here? or the intra-FE tolopology? Maybe be a
forward reference to s5.3.4 might clarify this if Inter-FE is right?

s3.1.1.3, para 2: 'For example, when
certain features of an LFB class are optional, the CE MUST be able to
determine whether those optional features are supported by a given
LFB instance.'
I have a vague feeling that this conflicts with the ‘suck it and see’
approach of coarse capabilities from the previous section. Also putting
a MUST into an example is unsatisfactory. It isn’t necessary here as
this is just the concepts section.

s3.2, para 8 (p16): 'In addition, the CE MUST understand where and what
type of header
modifications (e.g., tunnel header append or strip) are performed by
the FEs. Further, the CE MUST verify that the various LFBs along a
datapath within an FE are compatible to link together.'

I don't believe these are normative MUSTs. There is nothing the model
can do to enforce them.

s3.2.1, para 8 (p19): '...based on a FRAMETYPE metadata (N=2), or to fork
into color specific paths after metering using the COLOR metadata
(red, yellow, green; N=3), etc.'

The FRAMETYPE and COLOR hargon may be confusing to a novice reader and
are not strictly necessary.

s3.2.5: Event target terminology: It may be a bit late to change but the
term 'target' seems to convey the wrong idea. The 'target' actually is
the source of the event. Maybe 'anchor' might be better (taking our cue
from xml2rfc).

s4: General: The use of 'MUST' in many places but almost always 'may' is
IMO confusing. I think the problem is that the normative language is
(AFAICS) used to constrain the semantics of the XML schema - it isn't
about protocol behaviour. Now this is a reasonable use for this sort of
language but I think that at least some of the 'may's should also be
MAY. One way I thought about this could be to think of the section as
specifying the bahaviour of a tool that checks the semantics of the XML.
Stating this explicitly could then make it much clearer whether the
right language is being used. Please consider how to improve this.

s4.3: 'The load element MUST contain the label of the library document to be
included and may contain a URL to specify where the library can be
retrieved.'

Does anything need to be said about where it would come from if the
location os missing?

s4.5: The format of 'float16' needs to be defined. There probably needs
to be a reference to the right IEEE document that defines float32 and
float64.

s4.5: 'The boolean data type is defined here because it is
so common, even though it can be built by sub-ranging the uchar data
type.'

Two issues here: 1) sub-ranging hasn’t been talked about yet; 2) this
puts doubt into peoples’ minds about the size of the represenation.. is
a boolean 8 bits or 1 bit? Does this matter?

ss4.5, s4.5.6, para 1, s4.7.6.4, s8.3, 8.4 (and maybe elsewhere): These
sections refer to message names from the ForCES protocol. This is not a
good idea since it creates a bidirectional dependency between the docs.
generic terminology could be used rather than specific message names. I
am not entirely sure how to fix s8, but the current situation is not
totally desirable.

s4.5, last para: 'The predefined type alias is somewhere between the
atomic and
compound data types. It behaves like a structure, one component of
which has special behavior.' BUT *what is* an alias?? We should be told!

s4.5.3: arry Elelemt definition: Because of the talk about key fields
and use of structure components, it might be cleaner to place this after
structs and unions.

s4.5.3, para 2: 'The latter should be handled by capability components
of LFB classes, and should never be included in a data type array
which is regarded as of unlimited size' In the last part

Gen-art review of draft-ietf-rmt-bb-fec-basic-schemes-revised-05

2008-07-21 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-rmt-bb-fec-basic-schemes-revised-05.txt
Reviewer: Elwyn Davies
Review Date: 18 July 2008
IETF LC End Date: 29 July 2008
IESG Telechat date: n/a

Summary:
Nearly ready for IESG.  A few minor issues mainly with failure to 
specify encodings and a couple of corner cases. A few editorial nits 
noted below.


Comments:

s3.2.1: Need to explicitly document the encoding used for SBNs (also 
applies to s4.2.1 and s5.2.1. s5.2.1 also needs to specify encoding for 
Source Block Length).
s3.2.1, bottom of page 6/top of page 7: s/is processed at/to process the 
block by/ (two places) (or some such .. it doesn't read well at present).
s3.2.2.2: need to explicitly state encoding of various values (unsigned 
integers I assume). (also applies to s4.2.2.2, s4.2.2.3, s5.2.2.2
s4.2.2.3:  The case where the length is zero is a lttle odd!  I think it 
would be worth explicitly stating that (either) the whole object is just 
one octet long (or) it is four octets padded with zeroes.  The latter 
case might make processing more consistent since otherwise the zero case 
is special and the only case where the object is not four octet aligned.
s5.1:  it is not possible to encode the source block length of 65536 in 
16 bits unless 0 is overloaded to mean 2^^16.  This isn't specified. (I 
assume 'at most' to be read as 'less than or equal').


Editorial:

Abstract:  Need to expand FEC at least once!
s1, 2nd para after bullets: genrally not recommended to mention WG
s1, last para: s/listed/are listed/
s3.2.1: Need to asociate Source Block Number and SBN explicitly (well, I 
assume that is what SBN means!).

s3.4.1, next to last para: s/implementor of/implementor/
s3.4.2, lastpara: s/substracting/subtracting/
s4.4.2.2: I take the reference in the last para of the section (just 
above Fig 4) should be to s3.2.2.2.

s10, 2nd bullet: s/th/the/
s10, 3rd bullet: s/sis/did/

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-rmt-bb-norm-revised-04.txt

2008-04-15 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-rmt-bb-norm-revised-04.txt
Reviewer: Elwyn Davies
Review Date:  15 April 2008
IETF LC End Date: 17 April 2008
IESG Telechat date: (if known)

Summary:
A well-written document covering some pretty complex ideas.  Technically 
ready for the IESG but a little up front explanation for the naive 
reader would help as noted below.  Referring to the RFC 3269 guidelines, 
the document seems to have covered all the (relevant) bases.  There 
might be a question mark about the suggested congestion control 
mechanisms since they are pre-standard (at best). There are also a few 
editorial nits.

[Aside: The phrase 'the creation of an early NACK slot for these 
historical NACKers' raised a chuckle here! Non-British readers may not 
appreciate this.]

Comments:

s1. A little more explanation of just what a NACK based protocol does 
would be helpful, together with a note on 'timer-based NACK-suppression' 
and the idea of 'repairs'  and 'repair transmission'.

s2.4: 'NACK implosion problems' - this may require a little explanation.

s2.5: 'probabilistic timer-based NACK suppression' is just a piece of 
jargon at this stage in the document as it stands. See comment on s1.  
One thought I had was to move s2 after s3, but s3 is so large that this 
may not be appropriate.

s3.2.3.1, para 1: s/affect/effect/, s/provided/providing/

s3.9: Without casting aspersions on the competence of the papers 
referenced as [TfmccPaper] and [PGMCC], the assertion that the solutions 
described in two academic papers can meet the requirements for 
congestion control might seem a little cavalier or premature

s3.11:  Since this covers one of the prime requirements of RFC 3269, it 
might sit better as a top level section even though it is short.

Editorial:
(idnits does not report any issues).

Abstract: s/negative- acknowledgment/negative-acknowledgment/

s3.1: s/theFEC/the FEC/

s3.2.1, para 2: 'to initiate the NACK processor': s/processor/processing/?

s3.2.1, para 3: 'For probabilistic, timer-base suppression':  s/base/based/

s3.2.2, bullet 1.: Define what sort of logarithm is meant by 'ln' - and 
later define 'exp()'

s3.2.2, bullet 2.: The page break between page 15 and 16 is particularly 
infelicitous!

s3.2.2: The relationship between the parameters of the C routine and the 
variables defined on the body of the text is not absolutely clear.

s3.2.2, at top of page 16: 'Alternate values may be used to for buffer 
utilization, reliable delivery latency and group size scalability 
tradeoffs':
 s/to for/for/ probably

s3.7, para 1: 'only the sender require RTT knowledge' either s/sender 
require/sender requires/ or s//senders require/

s3.7.4, last para: s/therange/the range/

s4, end of para 3: s/if this acceptable/if this is acceptable/





___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


gen-art review of draft-ietf-rserpool-policies-08.txt

2008-04-11 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-rserpool-policies-08.txt
Reviewer: Elwyn Davies
Review Date: 11 April 2008
IETF LC End Date: 14 April 2008
IESG Telechat date: (if known) -

Summary:
Sorry, guys!  This document is not in good shape.  I know it is, in a
sense, the bottom of the tree and somebody reading it would probably be
expected to have read in to the subject through the overview (I scanned
it) and the protocol documents (I didn't look at them), but I found the
introduction opaque, for example:

 The selection of the pool user is
performed by two different entities.

Which ones? Selection of what? Selection of which pool user to get this
week's star prize?

Enough of irony and sarcasm:  I have two big technical questions about
this document (and hence the whole strategy of rserpool):

1. Why do policies appear on the wire in this way?  Do the individual
servers care about the policy of the group?  Would it conceivably work
if they weren't all conforming to some preconfigured policy?  Is this
expected to change over time?  Would weights change over time?  Seems to
me that policy is a preconfigured characteristic of the group.  Maybe
weight is something that a server might communicate during sign on.
Load is dynamic and probably needs to be propagated from time to time.
These are all conflated in these protocol elements.  Is this good
design?  Who really needs to know about policies dynamically?

2. Why should pool users have to worry about pool policy?  They just
want a server.  They don't want to have to (and IMO shouldn't have to)
try to second guess the pool controllers by munging around it what was
allegedly already a prioritized list, surely?  In order to do this,
especially in the adaptive cases, the pool user needs the weight and
load (according to the policy used) for each server passed in the list
of servers in response to the request on the rserpool server.  It isn't
at all clear that this is what happens.

Part of the overall problem is that the document does not clearly state
which communications use these items, why they would need to and how
frequently.

There are also detailed issues with the document, but I have to say that
I cannot see that we currently have an effective technical design.  It
is possible that these points have been discussed in the wg; if so some
explanation of the motivation for the arrangement is absolutely
essential.  I am happy to revisit this review if the authors can explain
the motivation and suggest text that will get the naive(ish) reader over
the understanding hump.

Comments:

s3.2:

A weight of 0 denotes that the pool element is not capable of
providing any service, a weight of 2*n denotes that the pool element
is capable of providing a two times better service than a pool
element having weight n.

For example, weight may define a compute service's computation
capacity.  That is, a pool element of weight 100 will complete a work
package in half of the time compared to a pool element of weight 50.

'two times better'?   Any attempt to quantify the meaning of weight
beyond a relative ordering of capability will lead to questions such as
'under what conditions?'  Leave it to the servers to make what they will
of weights - that is the best that the protocol can do.

s3 and s4: The encoding of weight and load is not specified other than
implicitly.

s4.1.3: How does the pool user know some information is out of date?


Editorial:
s1: Lots of acronyms need expansion.

idnits reporst reference issues:

Checking references for intended status: Experimental
  

  == Unused Reference: 'Dre2006' is defined on line 615, but no explicit
 reference was found in the text
 '[Dre2006]  Dreibholz, T., Reliable Server Pooling -- Evaluation, Op...'

  == Unused Reference: 'LCN2005' is defined on line 623, but no explicit
 reference was found in the text
 '[LCN2005]  Dreibholz, T. and E. Rathgeb, On the Performance of Reli...'

  == Outdated reference: A later version (-16) exists of
 draft-ietf-rserpool-common-param-15

  == Outdated reference: A later version (-19) exists of
 draft-ietf-rserpool-asap-18

  == Outdated reference: A later version (-19) exists of
 draft-ietf-rserpool-enrp-18



___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-art review of draft-ietf-netlmm-proxymip6-11.txt

2008-03-09 Thread Elwyn Davies


Sri Gundavelli wrote:
 Hi Elwyn,

 Sorry for the late reply. Thanks for reviewing the updated
 draft. We will address the two remaining issues. Please
 see inline.


   
No problem.. I am stuck in a hotel in Toronto, nit getting to IETF. :-(((

Snipped the first issue as that should be fine.

   
 Outstanding query: s6.1, bullet 2:  This bullet refers to 
 '*the* interface 
 identifier' and suggests that it might be retrieved from a 
 Router Solicitation. 
   My original point was that the IID for IPv6 addresses is 
 not necessarily 
 common between the addresses configured on an interface.  My 
 comment was a 
 little glib and the authors glossed over the point in their 
 reply.  I think this 
 bullet may require clarification to indicate which of the 
 IIDs would be implied 
 here.  Particularly if SEND is in use, the IID used for the 
 link local address 
 (that would typically be found in the solicitation) will a.s. 
 differ from the 
 IID used with the address assigned out of the prefix 
 allocated by Proxy MIP.  My 
 original point was to ask the authors to clarify whether 
 ProxyMIP actually cares 
 which IID is used and, accordingly, state either that 'it 
 doesn't matter' or 
 specifically which IID should be transmitted.


 

 This is the interface identifier (layer-2) and not the L3 identifier. 
 This is covered in the terminology section, Mobile Node Interface
 Identifier (MN-Interface-Identifier). 

 The need for the L2 interface identifier (such as MAC address) is
 to predictably identify the interface of a mobile node. The Access
 Technology Type in combination with the interface identifier is
 used as the index field in the BCE. 

 Looks like this is not implied. We can point to the
 MN-Interface-Identifier  term and that should probably make it
 clear. 
   
OK.. I think some clarification is required to make sure that you always 
get the same IID.  As specified I didn't grok that it had to be the same 
one from wherever the node roams to.

I think a few extra words will sort that out and then we are done.

Thanks
Elwyn
 Thanks again, for the review. Hopefully this addresses all the issues
 raised by the Gen-art review.


 Best Regards
 Sri






   


   
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-smime-multisig-04.txt

2008-03-07 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-smime-multisig-04.txt
Reviewer: Elwyn Davies
Review Date: 7 March 2008
IETF LC End Date: 7 March 2008
IESG Telechat date: (if known)

Summary:
Mostly fine except for a piece of unclear specification noted below and 
a few editorial nits.
Caveat: I am not a security expert and this should not be taken as an 
endorsement of the security competence of the proposal.

Comments:
s3:  The first part of the specification for MultipleSignatures is :

The fields in MultipleSignatures have the following meaning:

  - bodyHashAlg includes the digest algorithmIdentifier for the
  referenced multiple-signatures attribute.

  - signAlg includes the signature algorithmIdentifier for the
  referenced multiple-signatures attribute.

I am confused by the use of 'includes' here: Do these specs imply that 
the values of these fields are comma separated lists of all relevant alg 
identifiers for the signatures?  An example with three signatures might 
clarify what is going on, but the spec should be clarified in any case, 
I think (but I may just not be sufficiently knowledgable about this sort 
of spec).
 

Editorial:
idnits reports a clean bill of health.

Abstract: Expand CMS acronym.

s5: s/in a singled/in a single/

s5.2: s/the rquire application/the required application/

s5.3, para 5: The first sentence

 If signatures are added for the support of [ESS] features, then the
fact that an outer layer signature can be treated as a non-
significant failure.

does not parse.  Probably missing 'is invalid' or some such relating to 
outer layer signature.


Appendix B: 'hashes CMS'??? Does not parse!

B.1: s/is needed/are needed/

B.2 1/a/ii: s/Reistance/Resistance/

B.2 1/c/iii: s/success/successful/

B.2 2: Expand DER acronym.

B.2: is not normative but uses SHOULD NOT.

B.2 (2nd para on p18): s/that the attack/than the attack/



___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-rohc-rfc3095bis-rohcv2-profiles-05

2008-03-07 Thread Elwyn Davies
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-rohc-rfc3095bis-rohcv2-profiles-05
Reviewer: Elwyn Davies
Review Date: 7 March 2008
IETF LC End Date: 20 March 2008
IESG Telechat date: (if known)

Summary:
The document is almost ready for the IESG.  There are a couple of minor 
issues that ought to be resolved as detailed below (especially 
concerning DSCP in IPv4 and IPv6 headers and the notes about out of 
sequence list specification change packets) and a few editorial nits. 
Caveat: I have not rigorously checked the ROHC-FN specifications in 
section 6.8.2.4 although they seem superficially sensible.

Comments:
s1: It would be worth a sentence to remind readers without deep 
knowledge of ROHC that the reason that the document does not 'update RFC 
3095, etc' is because the protocol negotiates the available profiles 
between compression endpoints - so the extra profiles defined here just 
add to the available set.

s6.3.x/s6.8.2.1:  It would be easier for the reader (and more robust) to 
use the profile names rather than the expected hexadecimal values when 
referring to profiles here and anywhere else apart from the 
definitions.  Also there is some inconsistency as to whether the profile 
names should be capitalized or not.  Please choose one version.

s6.6.8, next to last para:  I believe the 'optional' should be an 
'OPTIONAL'.
s6.6.9, last para: -- ditto --

s6.6.13: Given that the protocol is supposed to tolerate some 
reordering, I think some words about how to handle sequentially early 
packets containing updates to list specifications wuld be useful.  
Implementations might have to ensure that they can cope with the pre- 
and post-update specifications for a short period if I understand correctly.

s6.9.1: The diagrams of feedback formats are inconsistent (some have bit 
numbers, some don't).  Also values should be specified in the text as 
well as as labels in the diagrams, and the encosing of the fields needs 
to be specified (unsigned ints I guess).

Appendices A.1 and A.2:  The Type of Service/Traffic Class fields are 
also known as DSCP (DiffServ Code Points) as of six or seven years ago.  
With the advent of Early Congetion Notification which uses bits in these 
octets, the values in these fields may not be as 'rarely changing' as 
would have been expected previously. It is also possible that some of 
the DiffServ PHBs might lead to more variable values in these fields 
although this is probably less likely in regions where ROHC is in use.  
Should this be taken into account?

Editorial:

General: use of lsb or LSB.  The document is extremely inconsistent.
General: Capitalization of (Most) Words in Section Headings needs Attention.

s5, para 1:  s/concepts relates/concepts relate/

s5.1.3, last para: s/to determine/for determining/

s5.2, para 2: s/to always verify the outcome of/for verifying the 
outcome of every/

s6.2, para 3: s/increasing/to increase/

s6.6.8, para 2: s/notation ./notation./

s6.8.2.1: Extra blank line needed after first bullet for consistency.





___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-netlmm-proxymip6-11.txt

2008-03-01 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.


Document: draft-ietf-netlmm-proxymip6-11.txt
Reviewer: Elwyn Davies
Review Date: 29 Feb 2008
IESG Telechat date: 06 March 2008

Summary:
Version 11 resolves almost all of the issues and nits that I raised in the last 
call review of version 10.  There is one editorial matter to complete the 'ease 
of reading' and an outstanding query which I think both I and the authors 
passed 
over a little lightly at the previous review.

An editorial update added to s3, para 4 (just after fig 1) to emphasize the 
pivotal role of the MN-Identity would be helpful.  Something like:
'The authenticated, stable identifier of the mobile node (MN-Identifier) 
uniquely identifies the mobile node to the LMA(s) as the node roams through the 
Proxy Mobile Domain.'

Outstanding query: s6.1, bullet 2:  This bullet refers to '*the* interface 
identifier' and suggests that it might be retrieved from a Router Solicitation. 
  My original point was that the IID for IPv6 addresses is not necessarily 
common between the addresses configured on an interface.  My comment was a 
little glib and the authors glossed over the point in their reply.  I think 
this 
bullet may require clarification to indicate which of the IIDs would be implied 
here.  Particularly if SEND is in use, the IID used for the link local address 
(that would typically be found in the solicitation) will a.s. differ from the 
IID used with the address assigned out of the prefix allocated by Proxy MIP.  
My 
original point was to ask the authors to clarify whether ProxyMIP actually 
cares 
which IID is used and, accordingly, state either that 'it doesn't matter' or 
specifically which IID should be transmitted.



___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-netlmm-proxymip6-10.txt

2008-02-19 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-netlmm-proxymip6-10.txt
Reviewer: Elwyn Davies
Review Date: 18 Feb 2008
IETF LC End Date: 20 Feb 2008
IESG Telechat date: 21 Feb 2008

Summary:
This document is well written and is in fairly good shape for submission 
to the IESG.
There are a number of minor issues which ought to be fixed.  I think 
that for a more general reader there are a number of points that are 
fully covered in the detail but when reading the introduction and 
protocol overview questions arise which aren't answered until later in 
the document, and I was left thinking whether the problem had been 
addressed until much later.  I have noted these items in the comments.  
I believe it would only take a few sentences to lay these issues to rest 
and make the document easier to understand for those who are not 
immersed in netlmm.

Comments:

s3, paras just after fig 2:  The para after fig 2 claims that the LMA 
sets up the bidir tunnel; then the next para claims that the MAG 
'establishes' the (same) tunnel.  Be clear which one has responsibility.

s3, p12:

The local mobility anchor, being the topological anchor point for the
mobile node's home network prefix, receives any packets that are 
 sent by any correspondent node to the mobile node.

I think it should be made clear (assuming I understand correctly what is 
going on) that this 'correspondent' node does not require any of the 
MIPv6 correspondent functionality and will not see any specialized MIPv6 
messages.  It is difficult to think of an alternative term, but this 
could be confusing.

s5.3.4, item 2:  Whether the tunnel is deleted is surely an 
implementation issue.  The LMA and MAG could agree to maintain the 
tunnel even if there are no MNs active on the MAG to save on setup 
costs.  I think this could be a MAY, leaving it up to implementers to 
optimize if desired. (This is actually discussed later in s5.6.1.. a 
forward pointer is needed here)

s6.1, bullet 2:  Does this make any assumptions about commonality of IID 
between addresses used by the interface?

s6.5: I thought it was said earlier that checking that the MN is 
entitled to mobility services was a MUST.  Does the SHOULD refer to the 
means of authenticating?

s8.2: The (M) flag is not added to the Binding Ack message by RFC 4140 
(only to the Binding Update msg).

s10: The new registry for the Handoff Indicator values is not specified 
in the IANA Considerations.

Areas where some earlier explanation would make life easier for the 
general reader:

3:  I think it would be useful to explain how the LMA knows that the MN 
that has moved from p-MAG to n-MAG is the same MN.. and hence gets the 
same prefix somewhere here (the MN_identity, auth and policy I think).

s5.1, last para:  (it turns out that s5.2 and s6.3 give most of the 
answers but I was left worrying) States that the mobile node's address 
prefix would normally be the key for the binding cache entry.  This 
implies that it will be a unique key and hence every MN requires a 
different address prefix.  I think this is sort of implied earlier, but 
I think it could be stressed at the outset.  This raises a couple of 
more significant issues in my mind:
- A MAG using stateless address config will be advertising one prefix 
per attached MN:  if there are lots of them the RA's will be very 
large.  Is this an issue? (not if everything is a pt2pt link, but
- How does the MN know which prefix to use if it isn't a pt2pt link?
[s5.2 does not address these issues although it clarifies that the 
prefix per MN mode is used]  s6.3 states that it is assumed that links 
will be pt2pt and hence only one prefix on link.  This should be made 
clear earlier, probably in the protocol overview.

I think some additional notes on the Shared_prefix model case and what 
happens if the links are *not* pt2pt would be helpful:  There is a 
significant risk of the RAs getting very large if multiple prefixes need 
to be advertised - and it requires slightly different policy to make 
sure a MN can pick the right prefix if there is more than one prefix 
advertised.

s6.4: I think that explaining where the DHCPv6 server would be and how 
it would know what prefix to take the address out of would be useful.  
(A few words plus a pointer to s6.11 would do.)

Editorial:

(idnits is happy with the document)

s2.2, MN-Identifier: Expand NAI and MAC acronyms.

s4.1: Associate PAD with Peer Authorization Database.

Fig 5: Provide key to various acronyms.

s5.1, bullet 1: 'enabled'/'turned off':   This reads as if the flag is 
sometimes present and sometimes not present.  Suggest using 
'set'/'reset' or 'true'/'false'.

s5.1, bullet 3: Define ALL_ZERO.

s5.2: The terms Per-MN-Prefix and Shared

Re: Finding information

2008-01-20 Thread Elwyn Davies
The information is available on the RFC Editor's web site at 
http://www.rfc-editor.org/
The RFC Database in various forms such as  
http://www.rfc-editor.org/rfc-index2.html tells you the status of each 
RFC and the RFCs that are associated with it by 
obsoletes/obsoleted/updated relationships etc.


Regards,
Elwyn

Willie Gillespie wrote:

As someone new to the IETF, how should I go about doing the following?

I want to find some information about IMAP and its extensions.  Let's
say I found RFC 1730.  How would I know that it had been obsoleted by
RFC 2060 and then by RFC 3501?  How do I find the extensions?  I don't
necessarily want to search through a list of 5000 entries to find what I
want.

That's where I think a naming scheme like IETF-IMAP would be handy.
Then I could look at a list of IETF-IMAP and see IETF-IMAP-2003 would be
newer than IETF-IMAP-1996.

But that's beside the point.  As of right now, how do I find this
information?  Is there a handy tool on tools.ietf.org that I should use?

Thanks for your help.

Willie

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

  


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-manet-packetbb-11.txt

2008-01-18 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.  Since this is now scheduled for next weeks telechat, you 
should liaise with your AD before making any changes.


Document: draft-ietf-manet-packetbb-11.txt
Reviewer: Elwyn Davies
Review Date: 18 January 2008
IETF LC End Date: 16 January 2008
IESG Telechat date: 24 January 2008

Summary:
This document is not ready for the IESG.

There are issues that must be addressed:
- There are parts of the packet format that are not fully specified (encoding 
of lengths not specified particularly).
- The supposed extensibility is currently chimeric.

The relationship between this draft, OLSR [experimental, RFC 3626] and OLSRv2 
[aiming for ps, draft-ietf-manet-olsrv2-04.txt] should be made clearer.  OLSR 
packet format has very little to do with the current work whereas OLSRv2 
explicitly uses the format specified here.

The inconsistency of the polarity of the inclusion/exclusion bits in the 
various semantics fields is ugly, unnecessary and likely to cause grief for 
implementers who get mixed up, as well as making the document difficult to 
read.  It would be good to fix this before OLSRv2 progresses further.

The layer violation required to obtain the notional address length from the 
lower level protocols is unpleasant.  I would like to see an optional field to 
carry this value explicitly that (a) avoid the layer violation and (b) make the 
format usable where the network layer protocol is not a conventional IP 
protocol (e.g. when the format is used in a DTN environment).

Personally I would prefer to see ABNF used to specify the packet grammar.  It 
is common IETF usage and  generally more familiar to standards readers than 
regular expressions.

Apart from these major issues, there are a number of more detailed comments 
below and a few editorial nits.

Comments:
s1/general:  While the use of regular expression formalism to express the 
packet content grammar is perfectly valid, the IETF normally prefers to use 
ABNF [RFC2234] to express grammars of this kind.  Since the very limited subset 
of RE that is actually used could be equally expressed in ABNF, consideration 
should be given to using ABNF.  This could be automatically checked and is 
likely to be more familiar to the general reader.  Also a number of items in 
the terminology could then be removed.

s2: The 'Network Address' is confusing and not really fully defined.  I presume 
that it is supposed to be the same as what is usually called an address prefix. 
 The exact interpretation of 'prefix length' needs to be spelt out (presumably 
that only that number of address bits measured from the left/most significant 
end of the address are significant).

s2: address-length:  Although address-length can be imputed from the network address fields of (IP) network layer if that is being used, it would make the format more genrally useful (I am thinking maybe DTNs here) if there as an optional field in the packet header (?) to carry the address-length explicitly.  That would also avoid forcing layer violations.   

s3: I sort of assumed from the statement that the protocol was derived from OLSR (an experimental proto, [RFC3626]) that the header compression ideas came from there and hence that there was a good deal of history that needed to be (or at least could conveniently be) brought over.  I believe that in practice there is relatively little propagated and some of the choices on this document are not the result of any history - see particularly comments on 'polarity' of semantics flag bits.  OTOH, it appears that OLSRv2 which is still a draft progressing towards PS explicitly uses this format. 


s3, para 2 and s7:  There are security concerns with using IPv4 mapped IPv6 
addresses, especially 'on the wire'.  Technically this usage is not on the 
wire, I guess, but I think it would be good to point out and justify that the 
security concerns do not apply (see [RFC4942] for discussion - also you can go 
back to 
http://www.watersprings.org/pub/id/draft-itojun-v6ops-v4mapped-harmful-02.txt
to see the original discussion at more length). 

s3, para 5: I am less convinced about the extensibility of the protocol than the authors seem to be because there is no mechanism for specifying behaviour when a receiver sees either messages or TLVs that it does not recognise.  A number of relatively standard techniques exist involving emebedded flags specifying drop/ignore packet/message if unrecognized, forward/drop message if unrecognized, etc 


s3, last para:  I believe the 'may' could be a MAY.

s3, last para:  AFAICS the example feature is not well chosen as the diffusion mechanism is orthogonal to the packet syntax specified here.  If there are things about the packet format that might

Gen-art review of draft-shimaoka-multidomain-pki-11.txt

2007-12-31 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-shimaoka-multidomain-pki-11.txt
Reviewer: Elwyn Davies
Review Date: 28 December 2007
IETF LC End Date: 1 January 2008
IESG Telechat date: (if known) -

Summary:
In general this is a well written and, as far as I can see, comprehensive 
document.  I have one major problem with it: it far exceeds the scope 
advertised in the Introduction.  It is very definitely not just about 
terminology.  It certainly gives definitions for names in a taxonomy of PKI 
Domains but it also defines the requirements and relationships of the 
components in the various models.  At the very least it should advertise itself 
as a framework or architecture.  Given the degree of detail and the (indirect) 
specification of bits on the wire, I would classify it as a standard.  Whether 
it is a standard rather than a framework depends to some extent on what else 
you could or would need to specify a fully working system.  Personally, not 
being an expert, the specification seems pretty complete. Not much would need 
to be changed IMO to make it good as a standard (just saying what it is and  
removing what appear to be unnecessary weasel words from the security section). 
 This seems to complement PKIX work and has had input for PKIX in the past.

Aside from this there are a few minor issues and some editorial nits noted below. 


Comments:

Abstract/s1.1: 
 The objective of this document is to establish a standard terminology 
  that can be used by different Public Key Infrastructure (PKI)

  authorities who are considering establishing trust relationships with
  each other.
I think that the document goes way beyond the stated aim of establishing terminology.  I have no problem with what it does, but there should be honesty in advertising.  At the very least this could be described as a framework document or maybe an architecture, but the degree of detailed requirements for the various different models which in many cases (indirectly) specifies the bits on the wire means that it would be quite possible to see this as a standard for PKI Domains.  Not being an expert in this area, I am not sure what else a 'standard' might specify if it was built using this document as a 'framework':  my immediate reaction is that there isn't much else to specify.. so is it really a standard?  Or are we shying away from trying to make standards in this arena (the  idea of creating standard terminology argues against this)? 

s6:  Related to the previous point, stating 
 Because this RFC defines terminology and not protocols or technology

  for implementing the terminology, technology-specific security
  considerations are not applicable.
seems disingenuous. Actually quite a lot of specific technology is mandated.  On the other hand, the actual security discussion seems to cover the situation quite well, and I think the disclaimer is unnecessary.  Whether the document is recast as a framework or becomes a standard, I don't think much, if any, extra would be needed in the security section. 


s2.2, para 2: The second sentence appears to be incomplete: A CA which issued a 
public-key certificate to another (subordinate) CA.

s3.2 and many other places: inadvertent trust - This term grates on my tongue.  I am 
unsure if this is just that using it 'intransitively' in this way is not good English.  The 
alternatives such as inadvertent creation of trust relationships are a little clumsy 
given the number of times it is used - maybe use an acronym?

s3.2.3, last para: s/MUST inform all PKI Domains of its membership in all other 
PKI Domains./MUST inform all those PKI Domains of its membership in any other 
PKI Domains./ (really informing *all* PKI domains might prove a little onerous!)

s3.3.2.1, Considerations: I believe that the first SHOULD is inappropriate.  
s/SHOULD consider/needs to take into account/

s3.3.2.2, Considerations: /For using the name constraints, the Bridge CA SHOULD 
pay attention to preventing a conflict of each name space/When applying the 
name constraints, the Bridge CA needs to avoid creating conflicts between the 
name spaces.../  I don't think this is a SHOULD:  The system is likely to fail 
if name conflicts are created.

Editorial:
s2.3.2.1, 3rd sentence: The root CAs MUST distribute trust anchor..
s/CAs/CA/, s/trust/a trust/

s2.3.2.3, Trust Anchor part: s/inappropriate/an inappropriate/

s2.4, para 1: s/Trust List/a Trust List/ (2 places), s/Trust Anchor/Trust 
Anchors/

s2.4, para 2: s/Detail information of each model is described/The two models are described in detail/; Also there is a duplicate cross reference to s4.1 at the end of the sentence. 


s3, PKI Domain: NOTE: This definition specifies how domain consists, besides CA domain

Re: Opportunity Re: IPv4 Outage Planned for IETF 71 Plenary

2007-12-19 Thread Elwyn Davies

I also think that we must think positive about this.

We do need to try things out.  I think we started our very first 
experiments with Wireless LAN at IETF 46 in Washington (I am just trying 
to find a museum to take the plug-in card Nortel sold(?) me that was 
never any use afterwards (the old 1Mbps not 802,11b 'standard') ).  It 
has taken us more or less 23 meetings to get to the point where 
essentially Wi-Fi 'just worked' measured by traffic on the attendees 
mailing list - it was sometimes a sore trial when 17 ad hoc networks 
stopped you connecting to the outside world, but we have learnt how to 
do it - and the vendors and operators have (I suspect) learnt a good 
deal in parallel.


Also one or two ISPs have actually embraced IPv6.  Mine (a smallish 
outfit in the UK) has done so.  To my shame I haven't exploited their 
capabilities yet - my New Year's resolution is to fix this situation.  I 
could run native IPv6 if I find an ADSL modem/router that handles it but 
in the meantime I can run a tunnel into my firewall box and go native 
IPv6 elsewhere. Ot will be an interesting experiment and I should be 
ready to handle any experiments at IETF. Have a look at 
http://www.aaisp.net/aa/aaisp/ipv6.html


Regards
Elwyn



Jari Arkko wrote:

I agree with Leslie on this. It is important to approach this in the
right light. Not an interop event; that would be for the implementors of
the products. Not a demonstration that IPv4 is still required for most
things; we know that already. Not a one hour session where thousand
people try to install something new at the same time without a network;
there needs to be better model for that.

But I think we should still do something. I viewed Russ' call as an
opportunity for the IETF community to take a challenge and see what we
can make happen by IETF-71. As a personal note, I've had IPv6 turned on
my equipment, home site, and company site for years but during the last
few months I have tried create a situation where most of own
communications would be on IPv6. We converted the company mail servers
and gateways that I use to dual stack; some of my own web systems got
 records too; I ensured that the tools that I use have the right
capabilities and defaults to use IPv6; I've contacted the admins of the
remaining IETF web sites that still are IPv4 only to ask if they can be
converted to dual stack. A significant part of my communications go over
IPv6 today, and I have a hope to get this to cover most of my
work-related communications. And yes, there's pain. I'm typically the
first one to experience the firewall config bug or routing issue on the
IPv6 side. But I'm willing...

So, I would suggest that we focus on the positive opportunities that
Leslie mentioned. Get more things to work. Challenge sponsors to do so
as well. Solve some of the remaining problems. Educate ourselves both by
doing and by seeing what others do or where they fail. See what works in
IETF-71 (but the format of that is less important).

Obviously, this needs planning -- Russ' mail is not the plan but rather
a call for us to figure out what would make sense. Much work needed...

I'm also somewhat surprised by the reluctance of people to try things
out. Where's our sense of adventure and eagerness to do new things? We
are engineers after all, tinkering with network setups should be fun,
no? Boldly go where no group of thousand has ever been... Or at the very
least, lets change something for the better.

Jari


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

  


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-ipv6-deprecate-rh0-01

2007-09-21 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-ipv6-deprecate-rh0-01.txt
Reviewer: Elwyn Davies
Review Date: 21/9/07  
IETF LC End Date: 20/9/07

IESG Telechat date: (if known) -

Summary: This document is almost ready for the IESG.  I have a couple of 
essentially editorial comments below.

Comments:
s3: IPv6 nodes **MUST NOT process** RH0 in packets whose destination address in the IPv6 
header is an address assigned to them. Such packets...:  The rest of the section then goes on 
to describe just how the node processes the header!  I think it should say something like: An 
IPv6 node that receives a packet with a destination address assigned to it and containing an RH0 
extension header MUST NOT execute the algorithm specified in the latter part of Section 4.4 of 
[RFC2460] for RH0. Instead such packets...

s4.2, para 1: The abbreviation RH is not defined (only RH0) so s/type-2 RH/type 
2 Routing Header/

Discussion:
This document accurately reflects the consensus that was reached in the 
community but there was considerable discussion about the appropriate course of 
action having discovered the issue.  I think that a short appendix noting the 
alternative ways forward and the reasons for not taking them would have been 
useful to avoid revisiting the discussion in future.




_


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-ccamp-inter-domain-pd-path-comp-05.txt

2007-08-17 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-ccamp-inter-domain-pd-path-comp-05.txt
Reviewer: Elwyn Davies
Review Date: 16 Aug 2007 
IETF LC End Date: 16 Aug 2007

IESG Telechat date: (if known) 23 Aug 2007

Summary:
I think this document needs significant work on the core description of the 
algorithm.  I found s4 to be difficult to read and it appears to contain a 
number of ambiguities and inconsistencies that should be fixed before it goes 
to the IESG.  The various sub-cases and routes through the algorithm are not 
very clearly expressed IMO. That being said, I think this is essentially a 
descriptive problem rather than any issue of principle. There are also a number 
of editorial issues (mostly need for acronym expansion) that need fixing in due 
course.

Comments:
s3.1: To avoid the sense of surprise when a Path message appears in the last 
bullet, I would suggest s/The path (ERO)/The path (specified by an ERO in an 
RSVP-TE Path message)/

s4, para 2/3:  Presumably para 3 is talking about the 'next hop' being loose or 
abstract as is implied by items 1) and 2).  It would be good to make this 
clear.  It would also be worth inserting a sentence making it clear that if the 
next hop is strict there isn't anything to do, since otherwise one has to scan 
the entire section to verify that this is the case.  It is just possible that I 
have misunderstood what is going on and some of the stuff *does* apply to 
strict hops - in which case the section needs a whole lot more clarity.  There 
also needs to be some words about the 'simple abstract node' case.

s4: Sending of PathErr.  This section states that PathErr messages 'SHOULD be 
sent' in several places.  Whilst this is consistent with RFC 3209, both of 
these documents appear to be (or may be) inconsistent with RFC 2205 which does 
not appear to provide any alternative to sending a PathErr when there is a 
problem processing a Path message.  If it is deemed correct to allow not 
sending the PathErr, reasoning should be given as to why this might be 
desirable, and what is the alternative (presumably silently ignoring the 
message?) and its consequences.

s4, item 1):  I think the first sentence ('If the next hop is not present in 
the TED.') is probably redundant and is certainly confusing.  Part of the 
confusion is that the rest of the item appears to only concern loose next hops 
but there is no pointer to what happens with the other case of abstract nodes.  
I think the description would be more logical with the paragraph on abstract 
nodes, from later in the section, moved to before item 1).  In that way the 
case splitting (strict/loose/abstract) would be much clearer.  BTW doesn't the 
simple abstract case have to do some of the non-simple work?

s4, item 1, bullet 2: Which domain has to be PSC?  The current one or the one 
containing the next hop?

s4, item 1: Worth making even clearer that *both* conditions have to be 
satisfied.

s4, item 1: 'If the next-hop is reachable, then it SHOULD find a domain 
boundary LSR...': What does 'it' represent here? The path necessarily crosses 
the boundary (unless we have some very weird topology here ;-) ) so there is 
*something* on the domain boundary.  What else could it find on the boundary?  
I think this is probably a badly expressed story about some other point.  
Reflecting on this, it strikes me that this is the key point where the routing 
information is pulled into the TE and this is very poorly expressed IMO.

s4, item 1: 'the ABR in the case of inter-area TE or the ASBR in the next-hop 
AS in the case of inter-AS TE should be the signaled loose next-hop in the 
ERO':  Does this mean in the expanded ERO or the original one?  If it is the 
original one, how is the implementor supposed to check it is an ABR/ASBR?


s4, item 2): The term 'ERO expansion' is not defined in any of the standards - 
it is referred to as an alternative shorthand in RFC 4736 (requirements doc).  
It needs to be defined.

s4, item 2), bullet 1: This section contains 3 instances of 'SHOULD'.  I am 
happy with the first one (policy applies).  The third one is covered by the 
discussion on PathErr above.  The second 'SHOULD' strikes me as a 'should' or 
even 'is'.  What else would be done if it isn't treated this way?  Bullet 2, 
sub-bullet 1 has a similar construction.

s4, item 2), bullet 2, sub 1: The condition at the beginning of this bullet 
could probably be written down more clearly.

s4, item 2), bullet 2/sub 1: 'If the boundary LSR is a candidate LSR for 
intra-area H-LSP/S-LSP setup (the LSR has local policy for nesting or 
stitching),...': Which LSR has the policy?  The boundary LSR or the one asking? 
There is an equivalent question for sub bullet 2.

s4, para

Gen-art review of draft-ietf-ipfix-implementation-guidelines-06.txt

2007-08-14 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-ipfix-implementation-guidelines-06
Reviewer: Elwyn Davies
Review Date: 20 July 2007
IETF LC End Date: 18 July 2007
IESG Telechat date: (if known)-

Summary:
Generally in good shape except that the use of RFC 2119 language is generally
inappropriate.  In many cases the uses of MUST represent reflectionsof
requirements in the actual protocol specification, but they are in many cases
paraphrases of the normative statements and thus could potentially be confusing
or result in conflicts.  Given that this is a guidelines document, I believe it
would be better to use statements along the lines of
'the protocol (document) requires' to avoid any potential problems.  There are a
few other minor issues noted below and some editorial matters although the RFC
editor will doubtless find some more.

Comments:
s1.4 suggests that RFC2119 normative language will be used:  in an informational
document billed as guidelines? In practice it looks as if many  of the MUSTs are
actually reflections or paraphrases of normative statements in the protocol
document, rather than the statements in this document being normative.  I think
it would avoid the appearance of being normative statements in their own right
and/or saying something marginally different from the real normative statement
if the wording was altered from 'MUST' to (say) 'the protocol (document)
requires'. Others are reflections of necessary facts of life. Instances of MUST:
- s3.1, para 3: reflection of IPFIX proto
- s3.1, para 4: not a requirement but a fact of life - Exporter has to dothis
because it just won't be able to continue if it doesn't.
- s3.3, para 1: reflection of statements in s3.4.2 of protocol spec.
- s3.4, para 1- first MUST: reflection of statements in s8 of protocol spec.
- s3.4, para 1 - second and third MUSTs: I am not clear that these musts are
backed up by the protocol spec.  The exporting order (s8 of proto spec) appears
to be a SHOULD;  I guess the collection reception order is implicit but isn't
set out explictly in the protocol.
- s3.5, para 1: supposed to be a reflection of s10.3.3 of protocol spec BUT
protocol spec says max 512 octets as compared with 576 in this doc.  Which is 
right?
- s3.5, para 2: relection of s10 of protocol spec.
- s4.1, para 3: I guess this is implicit in the statement about
malformedmessages in s9 of the protocol spec, but it could be argused that the
message is not malformed if it is just using a reserved Set ID. (the associated
SHOULD has the same caveat).
- s4.2, para 2: fact of life implied by other statements.
- s4.2, para 3: see s3.4, para 1, second and third MUSTs.
- s4.5.4: reflection of s3.3.1 of protocol spec.
- s5.1: Direct quote from protocol spec.
- s6.1, para 3: reflection of protocol spec s10.2.4.3 (as is the SHOULD).
- s6.1, para 4: Tautology?  Certainly a statement of the obvious.
- s6.1, para 10: (MUST NOT) reflection of protocol spec.
- s6.1, paras 2/3 from end: reflection/direct quote of protocol spec.
- s6.2, para 3 and 4 from end: reflection of protocol spec
- s6.3, para 3: direct quote
- s7.3, para 3: this instance appears to be requiring something that is outside
the scope of the protocol to determine.  draft-ipfix-info providesseparate
information elements to allow reporting of post-modification information but
there is nothing (or at least nothing that is guranateed tobe right in all
circumstances) that can be done to verify that the data collected is pre- or
post-modification.  This is intimately tied to difficulty/impossibility of
making a truly transparent middlebox.  I could noteven see an element that
needed to be included to separately specify thenature of the observation point
as regards whether it is pre- or post-modification or in the public/private
addressing realm of a NAT.  Using the'wrong' IEs will not break the protocol or
affect interoperability. All that can be done is remind implementers that the
appropriate kind of IEs ought to be used to reflect the location of the
observation point.
- s7.3, para 4: the same considerations as for the previous 'MUST' apply here as
well.
- s8.1, para 1 (REQUIRED rather than MUST): reflection of protocol spec s11.1
- s8.2, para 3: reflection of protocol spec s11.3
- s9.1, para 3, two places: reflection of s2.1 of ipfix-info draft
- s9.2, para 1: reflection of protocol spec s3.2
- s10.2, para 1: reflection of protocol spec s3.3.1

There are several instances of SHOULD and MAY also that need to be assessed in
the same way as the MUST instances.  In particular the MAY and SHOULD in the
last para of s7.3 can only be recommendations.

s6.1, para 3: The last sentence appears gratuitous and maybe wrong (I don't know
SCTP sufficiently well to know if stream

Re: draft-ietf-v6ops-natpt-to-historic-00.txt

2007-07-02 Thread Elwyn Davies



Christian Huitema wrote:

From: Noel Chiappa, Monday, July 02, 2007 6:08 AM
  

 From: [EMAIL PROTECTED] (Jun-ichiro itojun Hagino)

 if NAT-PT is to be made historic due to the claims presented in
the
 draft, all of the NAT related documents have to be made historic
 ...
 and all of the NAT traversal documents .. has to be banned at
once.

 [EMAIL PROTECTED] 911

The irony of that email address, appended to that message, is pretty
good.

Noel



:-)
  

:-) :-)

Firstly, let's be clear that there is a difference between NAT and 
NAT-PT.  The draft makes it clear that a major reason for not wanting 
NAT-PT deployed is that it effectively ties many of the characteristics 
of a developing IPv6 network to those of the existing IPv4 network.  
Whether there would actually be real differences remains to be seen but 
clamping IPv6 through a transition mechanism seems very short sighted, 
whatever the technical shortcoming of NAT-PT (or NAT) might be, and the 
draft tries to stop NAT-PT getting any further deployment because of this.


For better or for worse IPv4 NATs are here already and a.s. here to 
stay.  Trying to toss the specifications on the book bonfire is 
pointless and  counterproductive.  Likewise trying to kill off the NAT 
traversal industry would require a suitable Hydra-slaying superhero: 
Volunteers, two paces forward... wait for it! Maybe IPv6 will do the 
trick but even there we will require considerable vigilance.


However I have a good deal of sympathy for Christian's remarks below.  
The NAT/traversal industry has many of the hallmarks of the 'new IETF'.

Maybe someone should pause and consider why the IETF publishes
specifications, or informational documents. Over the last 15 years, I
have seen a drift of attitude, basically from engineering to a policy
making. 


In the old engineering attitude, working groups were created because
several like-minded engineers wanted to develop some function, or
protocol. It was important for them to get together, so they could
voluntarily agree on the details. If they did not, each would develop
their own version, and there will be no interoperability. The result was
documented in a set of RFC, so that whoever wanted to develop a
compatible product could. IANA registries are used to ensure that when
options arise, the options are numbered in an orderly manner. 


In the policy making attitude, working groups are created to control
evolution of a particular function. The working group members are
concerned that someone else might be implementing something harmful to
the Internet. Their goal is not so much to develop products as to ensure
that non-conforming products do not get developed. IANA registries are
used to control extensibility of the resulting protocols, to make sure
that bad options never get a number.

In short, the IETF evolved from an informal gathering where engineers
will agree on how to do things, to a reactive body that mostly aims at
controlling evolution of the Internet. Is that really what we want?

-- Christian Huitema
  
I hope not, but I fear you are correct.  IMO Much of this stems from the 
ossification and 'lowest common denominator' nature of the deployed 
network,  Arguably, the network/protocol suite is senile and truly 
novel, architecturally valid improvements are close to impossible 
because the network cannot adapt to them. The IETF is trying to prevent 
death rather than enhance life.


/Elwyn




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

  


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-sip-e2m-sec-05.txt

2007-05-21 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive. Apologies for the late arrival of these comments.


Document: draft-ietf-sip-e2m-sec-05.txt
Reviewer: Elwyn Davies
Review Date:  18 May 2005
IETF LC End Date: 14 May 2005
IESG Telechat date: (if known) -

Summary:
I think this document needs a fair bit of work before it is ready to go to the 
IESG.

The request to publish as PS to facilitate IANA registration rather than 
experimental (as merited by the content) appears to be spurious.  AFAICS RFC 
3261 only requires IETF consensus through an RFC of some suitable kind, not 
necessarily standards track.  The document should be published as experimental.


Although this proposed protocol is to be experimental, I believe that the 
specification as it stands is not sufficiently clear to be able to generate a 
well-defined result, let alone interoperable implementations.  At least part of 
the problem is linguistic:  there are parts of the document that are difficult 
to decode and the document would benefit from a co-author/editor with greater 
English language skills.  I have flagged some (but not all) of these places below.


Apart from issues of document clarity, I think there are several issues that 
need to be clarified:
- Handling integrity and/or confidentiality:  The introduction is less than 
clear that the protocol offers options for integrity alone and combined with 
confidentiality.  I would like to see a much clearer statement of what can be 
achieved and the variants that can apply to different proxies etc. up front in 
the introduction and then carried through the document.
- Clearer statements on what is protected by integrity (always the whole 
message?) and confidentiality (potentially different parts depending on proxy 
destination).  Some diagrams (or tables) showing the *complete* sip message with 
the added e2m security pieces indicating the total message structure and what is 
protected in each case.
- Several pieces (especially around integrity) offer multiple options for ways 
of doing things.  Whilst this is an experimental protocol, and hence some 
flexibility is desirable, I think there may be too many options - maybe this 
will get reduced after experiment but it would be good to say this or 
alternatively to choose one option now.  I am also not sure, particularly as 
regards carrying integrity information in SIP identity, that the recipient is 
able to determine what has been done by the sender in well-defined way.  There 
appeared to be a certain amount of hand-waving about this and the identity case 
is not mentioned in the detailed descriptions of behaviour.
- The protocol allows for using either pre-shared keys or exchanging 
certificates.  I think there is an issue in the case where a pre-shared key is 
used and, for whatever reason, the proxy is unable to decipher the results.  The 
specification expects to be able to send back a certificate with a key that the 
sender can use, but this is either not possible (if pre-shared keys are the only 
thing the proxy has) or may have some security issues if the proxy is allowed to 
substitute keys in this way.  Basically, the two cases get intertwined which 
doesn't seem desirable.


There are a few more detailed points below.


Comments:
Abstract:
The proposed status is PS although the second para of the abstract admits that 
the protocol is experimental.  This is justified because of the alleged need to 
have a standards track document for IANA registration.  AFAICS from the IANA web 
site and RFC3261, this is incorrect.  Registration requires IETF concensus 
manifested by means of a published RFC (presumably of a type that submits to 
IETF Last Call.. like this one). I see no reason why this should not be 
published as experimental to correctly reflect the status of the content.


s1, para 2: s/consists of/may require some or all of/

s1, para 4: 'The proposed mechanisms are based on S/MIME [3], since the major
  requirement is to have little impact on standardized end-to-end
  security mechanisms defined in [1], the way of handling S/MIME-secure
  messages.'  The last part of this does not make sense.  Maybe s/the way of 
handling/which already uses/?


s2.1, para 1: Expand CMS acronym.

s2.1, para 3:  The MUSTs in this paragraph are pointless and slightly confusing. 
 Only the source UA knows which proxies and UAS are targeted, so a recipient 
cannot do any checks to verify that what is there satisfies the MUST.  All that 
is being is stated is that it is a good thing if the list contains exactly the 
intended recipients and the relevant keys.


s2.1, Figures 1 and 2 titles: s/for Sharing/to be Shared/


s2.2, para 1: 'Generating the
  signature requires the generator, i.e., the UA, has its own public

Re: In support of symbolic references

2007-04-07 Thread Elwyn Davies



Brian E Carpenter wrote:

On 2007-04-06 08:12, Jari Arkko wrote:

Simon,


Maybe we can lobby for it to become the default.

+1

(I think it would be the right default, even if I agree with John
Klensin's concern.)


Putting symrefs into all the xml2rfc templates would not be a
bad idea. 
The 'default; in the templates on the RFC Editor's webpage 
(http://www.rfc-editor.org/formatting.html) are already set to give 
symbolic references,

If you want to suggest a change in the default,
writing to [EMAIL PROTECTED] is a good first move.

There is an issue with 'no surprises' as Marshall has written on that list.

/Elwyn


Brian

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Prague

2007-03-08 Thread Elwyn Davies



Tim Chown wrote:

On Wed, Mar 07, 2007 at 12:23:21PM -0500, Ralph Droms wrote:
  

I visited Prague about two years ago and had the same experience as Ed.  I
traveled via the Metro and on foot, visited all the tourist traps; had no
problems and never felt unsafe.



I second that.  The metro system was excellent; it would be interesting
to know what the closest stop to the hotel is on the metro map:
http://www.dpp.cz/download/schema-metra-v-praze.pdf

Tim
  

+1
The nearest metro is Florenc. The nearest exit (Sokolovská) is about 
250m from the Hilton Hotel.
http://www.csl.cz/en/site/klient/sluzby_kontakty/doprava_na_letiste/do_mhd.htm 
has suggestions for airport to city centre via bus and metro

Bus to ZLIČÍN followed by metro to Florenc looks convenient.

/Elwyn

/Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

  


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-v6ops-natpt-to-historic (Reasons to Move NAT-PT to Historic Status) to Informational RFC

2007-02-28 Thread Elwyn Davies

Just to clarify the current situation...

The statement below says that the recommendation is for RFC 2766 to be 
reclassified to experimental..  As is implied by the title of the draft, 
it actually recommends reclassification to Historic.


This error results form a piece of history ;-) - The draft is 
fundamentally the same as draft-v6ops-natpt-to-exprmntl-03.  The change 
in recommendation has been necessitated because it appears that RFC 2026 
does not allow the transition to experimental.  In the meantime it has 
become ever more clear that NAT-PT is of dubious value and could limit 
the development of IPv6 over time.


Regards,
Elwyn

Brian E Carpenter wrote:

I think it's important to publish this document, to make it
clear why NAT-PT is a solution of very dubious value.

Brian

On 2007-02-27 20:14, The IESG wrote:
The IESG has received a request from the IPv6 Operations WG (v6ops) 
to consider the following document:


- 'Reasons to Move NAT-PT to Historic Status '
   draft-ietf-v6ops-natpt-to-historic-00.txt as an Informational RFC

This document recommends that the IESG reclassifies RFC 2766 from
Standards Track to Experimental status.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-v6ops-natpt-to-historic (Reasons to Move NAT-PT to Historic Status) to Informational RFC

2007-02-28 Thread Elwyn Davies



Hallam-Baker, Phillip wrote:

The core assumption here seems to be that NAT is a bad thing so lets get rid of 
NAT rather than trying to make NAT work.
  
NAT-PT is not NAT.  It does a whole lot more, but it *cannot* do what it 
claims to do completely, because the semantics on the two sides are 
different, unlike NAT.  Dual stack is a better way forwards for the 
general case.
If you read carefully the draft suggests that there may be scenarios in 
which a modified form of NAT-PT might be useful, so it is hardly extreme 
NAT bashing.

3) Exactly why should an application be invited to care about this issue?

  
Because whether the packets pass through a NAT-PT or otherwise affects 
what the application might expect from the network.


NAT does, for better or for worse, solve some real problems.
NAT-PT makes new problems: Not good news for a transition mechanism and 
it militates against future improvements to IPv6.


/Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-ietf-crisp-iris-dchk-06.txt

2007-02-10 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.


Document: draft-ietf-crisp-iris-dchk-06.txt
Reviewer: Elwyn Davies
Review Date: 10 February 2007
IETF LC End Date: 21 February 2007
IESG Telechat date: (if known) -

Summary:
The document itself maybe nearly ready for IESG apart from a few 
editorial nits (see below). However there are a couple of issues with 
associated documents that might upset this situation. 

1. The DCHK schema is allegedly a proper subset of DREG2 which is 
'defined' in an expired draft (and this revision of RFC 3982 isn't 
mentioned in the crisp charter).  So the wg needs to decide if DCHK is 
intended to work only with DREG2 or whether it can also work with DREG - 
and if so whether any backwards compatibility is needed.  If the former 
the wg and authors need to ensure that DREG2 progresses (and that DCHK 
remains a subset of DREG2) or change DCHK to reference the existing DREG 
and ensure that it is a subset of DREG.


2. The crisp LWZ protocol which is referenced is the subject of a major 
DISCUSS in the IESG and has not progressed recently.  The authors and wg 
also need to decide if the reference to LWZ is essential to the progress 
of this document - it could possibly be substituted by appropriate 
weasel words about using a 'lighter weight' protocol if one is defined.


Caveat: I haven't checked the XML schema in detail or checked that it 
*really* is a subset of the DREG2 schema.



Comments:

Editorial
=

Abstract:Expand IRIS acronym.

s1: Expand DREG2 acronym.

s1. para 2:s/status of domain/status of domain names/

s1, last para: s/effecient/efficient/

s3: Probably good to use the expanded from of DCHK in the section title.

s3.1.1: Caption of domain example display: it looks as if XML escapes 
didn't get substituted.  I suspect that this may be to do with using 
XMLmind to edit the doc. XMLmind recognizes XML metacharacters and 
substitutes entities in attributes and text outside CDATA segments. So 
if you input lt; in (e.g) an attribute, the saved text will be amp;lt;. 

s3.1.1, several bullets: 'period at' doesn't make sense.  I think you 
mean 'duration of grace period at' in each case.


s3.1.1.1, description bullet: I think the 'must' should be a 'MUST'.





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-art last call review of draft-ietf-webdav-rfc2518bis-17.txt

2007-01-30 Thread Elwyn Davies

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
_http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html_).

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-webdav-rfc2518bis-17.txt
Reviewer: Elwyn Davies
Review Date: 30/01/2007
IETF LC End Date: 21/01/2007
IESG Telechat date: (if known) -

Summary: Apologies for the late review - I missed the aassignment somehow.
This document is almost ready for the IESG.  There are a couple of 
issues which need a little clarification IMO and the IANA considerations 
are suffering from 'a standard problem' - RFC 2518 defined most of 
things claimed to be needing registration as a result of this document 
so they are not actually new, but RFC 2518 didn't actually have explicit 
IANA considerations.  Consequently the IANA considerations need to be 
rephrased to clarify that these are updated definitions rather than 
new.  There are also some minor editorial nits that could get fixed 
during the update. Caveat: I have not made a detailed check of the 
syntax/semantics of the examples.


Comments:
Issues:

s4.3, para 2: 'Older clients will not break when they encounter 
extensions because they will still have the data specified in the 
original schema and MUST ignore elements they do not understand.'  This 
specification cannot enforce compliance retrospectively! s/MUST/were 
required to/.


s6.6, para 3: 'notifications should be sent': Is this supposed to be a 
function of webdav?  This is the only mention of lock notifications in 
the document.


Potential security implications of lockdiscovery:  s6.8 requires a 
compliant server to support lockdiscovery and expects the response to 
this request to include the names of principals and potentially the lock 
tokens for locks being held on a resource.  The privacy implications of 
this are discussed in the Security Considerations but it does not appear 
to be allowed to restrict or deny this request purely on security 
grounds.  It is likely that some organizations might consider the 
ability to determine who holds locks is a sensitive matter beyond just 
issues of privacy, and the responses to lockdiscovery might be mediated 
by access controls.


s9.1: PROPFIND method: It is probably not a big deal, but the ability of 
'new' servers to deny depth-infinity PROPFIND requests interacts with 
the suggestion that they should treat client requests without a Depth 
header as depth-infinity requests.  This may result in a different 
response from a fully compliant new server as compared with a legacy RFC 
2518 server.  Is this likely to cause severe disruption to legacy clients?


Treatment of 'allprop':  I believe that the various statements about 
which live properties will be returned by 'allprop' are not fully 
consistent.  In the third bullet of s9.1 it is stated that allprop gets 
you 'property values for those properties defined in this specification' 
and offers the 'include' element as a way to increase the set of values 
returned. This interpretation is repeated in the examples (especially 
s9.1.6) and s14.2. However, the paragraph next but one after the bullets 
(split across the  page 40/41 page boundary) states 'For a live property 
defined elsewhere, that definition can specify whether that live 
property would be returned in 'allprop' requests or not.'  Finally 
Appendix F.1 states that the allprop semantics 'have been relaxed so 
that servers *may* [My emphasis] leave out live properties defined in 
other specifications'.  So it appears that there are three different 
possibilities here - some clean up is needed.


s21 IANA Considerations:
The various items here do not require  new registrations as they were 
all registered as a result of RFC 2518 (and RFC 4229). This document 
updates the registrations (and in a sense formalizes them since RFC 2518 
did not have an IANA Considerations section explicitly). s21.1 should 
refer to RFC 4395 which controls the URI Scheme registry. s21.3 should 
refer to RFC 4229 which formalized the initial state of the message 
header field registrations.  It occurs to me that I did not check if 
there are any message headers which were in RFC 2518 but are now dropped 
- if so this should probably be recorded here.


Editorial
===

general: Check the capitalization of headings (e.g., s7.5.2).

s1, paras 9/10: s/new/extra/ (2 places) - they certainly aren't new in 
this specification.


s1, para 11: s/request and response/requests and responses/, s/all 
all/all/, move cross-ref to Section 17 to end of sentence.


s4.3, para 3: s/undefined), not multiple values/undefined); it does not 
have multiple values/


s6.1, item 4: This is the first appearance of the 'depth' concept and it 
isn't defined previously.  I think something could be usefully added to 
the terminology section to introduce depth, and specially infinite depth.


general: various

Prague (Praha) street maps and hotels (was Re: IETF 68 hotel full)

2006-12-20 Thread Elwyn Davies
Search for Praha postcode 18600 or the Florenc metro station which is 
just nearby (slightly south of hotel).


Link to maps centred on hotel:
http://www.multimap.com/map/browse.cgi?lat=50.0922lon=14.439scale=5000icon=x
(links to some hotels relatively nearby)

www.mappy.com finds about 30 hotels fairly close to the Hilton (search 
for the Florenc metro, zoom out a couple of times and search for hotels)


www.map24.com is good for restaurants (search for praha 18600)

Elwyn


On 12/19/06, Brian E Carpenter [EMAIL PROTECTED] wrote:

BTW, www.mappy.com is pretty good for maps and itineraries in Europe.

Brian

John Levine wrote:
I'm having trouble finding Pobrezni 1 186 00 Prague 8 Czech Republic
with online maps.


 I believe hotel is toward the west end of the street, near the bridge
 to the island in the river:

 
http://maps.google.com/maps?f=qhl=ene=UTF8om=1ie=UTF8z=16ll=50.092682,14.443717spn=0.009375,0.016673 



 On the other hand, the Hilton web site just offered me a room for IETF
 week at E152 which appears to be the IETF rate, so it's not all that
 sold out.

 Regards,
 John Levine, [EMAIL PROTECTED], Primary Perpetrator of The Internet 
for Dummies,

 Information Superhighwayman wanna-be, http://www.johnlevine.com, Mayor
 More Wiener schnitzel, please, said Tom, revealingly.


 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf






___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Last Call: 'Procedures for protocol extensions and, variations' to BCP

2006-08-30 Thread Elwyn Davies

A couple of nits:

s3: It might be helpful to make the first three paras into a bulleted 
list and add an introductory sentence like:
'There are various ways in which an extension to an IETF can be 
introduced into the IETF:'


s3, para 3: If my understanding is correct, a document from the normal 
Independent Submissions path cannot get directly on to Standards Track 
because of the additional requirements for community and IESG review. 
This being the case, I think it would be good to make this clear here.


s3, para 6: s/spark hits/idea is formulated/ (phrase is a bit colloquial)


/Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: L2VPNs must not be IP(v4)-only

2006-08-17 Thread Elwyn Davies

Hi.

Maybe I wasn't paying attention but I don't recall seeing messages about 
this on either the ipv6 or v6ops mailing list. I guess you may have 
asked around but I'm sure somebody in the wg's could have helped if a 
public request was made (especially the ndproxy authors).


Be that as it may, I agree with Pekka that this document should not 
proceed without the IPv6 case being addressed.  As regards what needs to 
be done, I guess that RFC4389 provides most of the information - note 
that RFC4389 is classified as experimental and there may be some 
discussion as to whether the same arguments that lead to this 
classification apply to the whole of the arp mediation draft.  Both any 
proposed IPv6 support and the existing IPv4 proposals MUST ensure that 
they have satisfactorily addressed the architectural issues in 
draft-thaler-intarea-multilink-subnet-issues-00.txt.


Regards,
Elwyn

Shane Amante wrote:

Pekka,

This topic has come up in the past -- the last time I recall it being 
a significant issue was IETF 63 in Paris, France.  On multiple 
occasions since then we have asked for volunteers with IPv6 expertise 
to help complete the IPv6 bits of this I-D.  Unfortunately, we have 
gotten little to no response.   Do you wish to help out with this?  
Or, can you provide a pointer to folks in the IPv6 world that can take 
a look at this doc and help out?


Thanks,

-shane


Pekka Savola wrote:

On Wed, 16 Aug 2006, [EMAIL PROTECTED] wrote:

A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the Layer 2 Virtual Private Networks 
Working Group of the IETF.


Title: ARP Mediation for IP Interworking of Layer 2 VPN
Author(s): H. Shah, et al.
Filename: draft-ietf-l2vpn-arp-mediation-07.txt
Pages: 21
Date: 2006-8-16

...

The VPWS service [L2VPN-FRM] provides point-to-point connections
between pairs of Customer Edge (CE) devices.  It does so by
binding two Attachment Circuits (each connecting a CE device
with a Provider Edge, PE, device) to a pseudowire (connecting
the two PEs).  In general, the Attachment Circuits must be of
the same technology (e.g., both Ethernet, both ATM), and the
pseudowire must carry the frames of that technology.  However,
if it is known that the frames' payload consists solely of IP
datagrams, it is possible to provide a point-to-point connection
in which the pseudowire connects Attachment Circuits of
different technologies. This requires the PEs to perform a
function known as ARP Mediation. ARP Mediation refers to the
process of resolving Layer 2 addresses when different resolution
protocols are used on either Attachment Circuit. The methods
described in this document are applicable even when the CEs run
a routing protocol between them, as long as the routing protocol
runs over IP.



The document says,

 10. IPV6 Considerations

 The support for IPV6 is not addressed in this draft and is for
 future study.

This needs to be addressed throughout the document.

The whole point of L2VPNs (IMHO) is that it's agnostic of what 
protocols users run above L2.  Users depend on a transparent L2 
service model and this model breaks that assumption.





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF66 - Recommendations for travel from airport to hotels?

2006-07-06 Thread Elwyn Davies

Minor clarification in case your ethics are troubling you...

Elwyn Davies wrote:

Airport shuttles:
Unfortunately the Delta doesn't seem to qualify for a free shuttle.  The
nearest is probably the Queen Elizabeth (900 boulevard Rene-levesque
Ouest) which is about 0.25 mile from the Delta..
This doesn't involve taking a second 'free' shuttle as the main, 
paid-for, shuttle stops here on the way to the central bus station.


Alternatives include riding to the central bus station and taking the
metro (Orange Line, direction Cote Vertu) three stops from the metro
station at Berri-UQAM (under the bus station) to Square Victoria - this
station has an exit either in or right in front of the Delta. (Place
D'Armes will be better for the hotels closer to the Palais des Congres)

Shuttles run approx every 25-35 minutes and are scheduled to take about
40 minutes.

BTW for the seriously lazy, the Palais des Congres is on top of the
Place D'Armes metro stop which is one stop back towards the central bus
station from Square Victoria

There are regional commuter trains out to Dorval but the service is
seriously sparse at the weekend and just as bad outside of early morning
inbound and evening rush hour outbound.  Forget it.

Fares:
Airport shuttle - one way 13 CAD, return 22.75 CAD
Metro: per trip any distance (I assume): 2.50 CAD single trip, 11.50 CAD
for a six trip card, one day and three day tourist passes available.
Tickets sold at stations or on buses (on buses exact change only)

Handy links:
Airport shuttle bus: 
http://www.autobus.qc.ca/anglais/aeroportuaire_an.html

Useful handily zoomable map of the centre of Montreal (probably the best
online city map I have ever seen!):
http://www.stcum.qc.ca/English/info/centre-ville2006.pdf
The whole city map is much bigger but equally good:
http://www.stcum.qc.ca/English/info/reseau2006.pdf
Metro map: http://www.stcum.qc.ca/English/metro/a-mapmet.htm - click on
any station for local info including a large scale map with station
entrance/exit points marked.
Bus/metro fares: http://www.stcum.qc.ca/English/info/a-tarif.htm
Montreal transport home page: http://www.stcum.qc.ca/English/a-somm.htm

Regards,
Elwyn


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF66 - Recommendations for travel from airport to hotels?

2006-07-05 Thread Elwyn Davies

Airport shuttles:
Unfortunately the Delta doesn't seem to qualify for a free shuttle.  The
nearest is probably the Queen Elizabeth (900 boulevard Rene-levesque
Ouest) which is about 0.25 mile from the Delta..

Alternatives include riding to the central bus station and taking the
metro (Orange Line, direction Cote Vertu) three stops from the metro
station at Berri-UQAM (under the bus station) to Square Victoria - this
station has an exit either in or right in front of the Delta. (Place
D'Armes will be better for the hotels closer to the Palais des Congres)

Shuttles run approx every 25-35 minutes and are scheduled to take about
40 minutes.

BTW for the seriously lazy, the Palais des Congres is on top of the
Place D'Armes metro stop which is one stop back towards the central bus
station from Square Victoria

There are regional commuter trains out to Dorval but the service is
seriously sparse at the weekend and just as bad outside of early morning
inbound and evening rush hour outbound.  Forget it.

Fares:
Airport shuttle - one way 13 CAD, return 22.75 CAD
Metro: per trip any distance (I assume): 2.50 CAD single trip, 11.50 CAD
for a six trip card, one day and three day tourist passes available.
Tickets sold at stations or on buses (on buses exact change only)

Handy links:
Airport shuttle bus: http://www.autobus.qc.ca/anglais/aeroportuaire_an.html
Useful handily zoomable map of the centre of Montreal (probably the best
online city map I have ever seen!):
http://www.stcum.qc.ca/English/info/centre-ville2006.pdf
The whole city map is much bigger but equally good:
http://www.stcum.qc.ca/English/info/reseau2006.pdf
Metro map: http://www.stcum.qc.ca/English/metro/a-mapmet.htm - click on
any station for local info including a large scale map with station
entrance/exit points marked.
Bus/metro fares: http://www.stcum.qc.ca/English/info/a-tarif.htm
Montreal transport home page: http://www.stcum.qc.ca/English/a-somm.htm

Regards,
Elwyn


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF66 - Recommendations for travel from airport to hotels?

2006-07-05 Thread Elwyn Davies
Unfortunately the Delta doesn't seem to qualify for a free shuttle.  The 
nearest is probably the Queen Elizabeth (900 boulevard Rene-levesque 
Ouest) which is about 0.25 mile from the Delta.. 

Alternatives include riding to the central bus station and taking the 
metro (Orange Line, direction Cote Vertu) three stops from the metro 
station at Berri-UQAM (under the bus station) to Square Victoria - this 
station has an exit either in or right in front of the Delta. (Place 
D'Armes will be better for the hotels closer to the Palais des Congres)


Shuttles run approx every 25-35 minutes and are scheduled to take about 
40 minutes.


BTW for the seriously lazy, the Palais des Congres is on top of the 
Place D'Armes metro stop which is one stop back towards the central bus 
station from Square Victoria


There are regional commuter trains out to Dorval but the service is 
seriously sparse at the weekend and just as bad outside of early morning 
inbound and evening rush hour outbound.  Forget it.


Fares:
Airport shuttle - one way 13 CAD, return 22.75 CAD
Metro: per trip any distance (I assume): 2.50 CAD single trip, 11.50 CAD 
for a six trip card, one day and three day tourist passes available.

Tickets sold at stations or on buses (on buses exact change only)

Handy links:
Airport shuttle bus: http://www.autobus.qc.ca/anglais/aeroportuaire_an.html
Useful handily zoomable map of the centre of Montreal (probably the best 
online city map I have ever seen!): 
http://www.stcum.qc.ca/English/info/centre-ville2006.pdf
The whole city map is much bigger but equally good: 
http://www.stcum.qc.ca/English/info/reseau2006.pdf
Metro map: http://www.stcum.qc.ca/English/metro/a-mapmet.htm - click on 
any station for local info including a large scale map with station 
entrance/exit points marked.

Bus/metro fares: http://www.stcum.qc.ca/English/info/a-tarif.htm
Montreal transport home page: http://www.stcum.qc.ca/English/a-somm.htm

Regards,
Elwyn

Yangwoo Ko wrote:


Why not just googling?

I entered aerobus and montreal at Google, and found
the following link.

http://www.admtl.com/passenger_services.aspx?id=48

If this is correct, the aerobus takes us to a few
points in downtown from which we can take free shuttle
to hotels.

Nelson, David wrote:


Aerobus shuttle bus service runs from the downtown bus terminal 
(514-842-2281) with several stops before taking

the highway. Fares are lower than taxis: $12 to or from
Trudeau.


And from the bus terminal to the hotel?  Presumably taxi or city bus?
Any other alternatives?

Are they any shuttle busses from the airport that make stops at the
downtown hotels?

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF IPv6 platform configuration

2006-06-12 Thread Elwyn Davies



Kevin Loch wrote:

Sam Hartman wrote:

secIETF == IETF Secretariat [EMAIL PROTECTED] writes:
secIETF *Only HTTP, SMTP, FTP, and DNS traffic are permitted 
through an IPv6 secIETF Native firewall (pings, 
traceroutes etc. are dropped) 


Please make sure that ICMP messages needed for path MTU discovery are
not filtered.


Is there a compelling reason to filter ICMP at all?

- Kevin
This is not a trivial problem.  There is a draft in progress which 
recommends what the v6ops wg believes ought to happen.
See 
http://www.ietf.org/internet-drafts/draft-ietf-v6ops-icmpv6-filtering-recs-00.txt
This does include making sure Packet Too Big errors are not dropped so 
that PMTU works,


This is just about to very slightly updated but it is essentially finished.

It would be good if we ate our own dogfood in this case (and we can also 
test whether the draft has the answers right!)


Regards,
Elwyn




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/iet


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Gen-art review of draft-hartman-mailinglist-experiment-01.txt

2006-03-07 Thread Elwyn Davies

Hi.

I am going to take my gen-art hat off here because I want to suggest 
alternatives rather than just assessments.


I have no inherent problem with what we are calling meta-experiments, 
although there are issues regarding whether the community will feel 
comfortable with just granting the IESG some power to 'do something' 
without having much idea what it is.  Determining what constraints might 
placed on that power might take as long as actually specifying what 
should be done.  On the other hand if you constrain the powers too 
tightly you might as well not bother with the meta-experiment. I think 
that is the problem you have already identified.


The main difficulty I have with the draft as it stands is that  the last 
paragraph of s1 says that the experiment will do something definite, but
s4 actually just gives the IESG a general power.  This is not 
consistent - it falls between the two stools mentioned above:  although 
s4 suggests what types of delegation are envisaged the IESG can do 
whatever it likes regarding mailing list control and what actually 
happens might bear no resemblance to the second half of s4 para 1 and s4 
para 2.  So I think the draft can go one of two ways:


1 (which I think Sam would prefer):
Redraft the memo as purely the meta-experiment and remove the 
suggestions of what the IETf might do, to avoid any possibility that 
people might be convinced that this was the only thing that could happen.

===
Delete the last but one sentence of s1 - the modified document won't 
actually create any particular level of sanction.

Modify the previous sentence:


This memo is an RFC 3933[RFC3933] experiment to provide
   the community with additional mechanisms to manage its mailing lists
   while the community decides what mailing list guidelines are
   appropriate.


to:
This memo is an RFC 3933[RFC3933] experiment which will enable the IESG 
to provide the community with additional mechanisms to manage its 
mailing lists while the community decides what mailing list guidelines 
are appropriate.


Remove the 3rd and 4th sentences (from 'Such methods...') of para 1 and 
the whole of para 2 of s4.


Replace the last part of para 4 of s4:


While such last calls are encouraged, they are not
   required.  The reason that the last call is not required is that
   under RFC 2418, no last call is required; there seems to be no reason
   to have a procedure more strict than that proposed in RFC 2418.

Since RFC2418 does not require actions taken to be Last Called, it is 
explicitly permitted  that any procedure put in place under the powers 
granted by this experiment need not require a Last Call before it is 
implemented, as there seems to be no reason to have a procedure more 
strict than is permitted in RFC 2418.


If the resulting document is approved as an RFC3933 experiment, then the 
text removed from paras 1 and 2 can be put to the IESG as a proposal.


The main issue with this as an experiment is that there are two sets of 
evaluations that can be done:

- was the meta-experiement a success?
- were any procedures adopted under the extra powers succcessful?
It is not very obvious how to judge the original meta-experiment 
especially if the adopted procedures don't work out!

=
2.  Redraft the document to remove the general power given in s4 - then 
s1 is accurate, and the experiment would just cover the explicit 
procedures set up in the second half of para 1 and para 2 of s4.


==

Thoughts?

Regards,
Elwyn

Sam Hartman wrote:

Elwyn == Elwyn Davies [EMAIL PROTECTED] writes:



Elwyn I was selected as General Area Review Team reviewer for
Elwyn this specification (for background on Gen-ART, please see
Elwyn http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Hi.
I'm sorry it has taken me so long to get back to your comments.
I've been busy trying to clear documents before the Dallas IETF.


Elwyn Summary: [Note: This is the first time that I have done a
Elwyn Process Experiment review and I will have to stretch the
Elwyn usual review criteria a bit.  Basically I believe I should
Elwyn be looking for internal self-consistency, consistency with
Elwyn associated processes and likelihood of damage to the
Elwyn functioning of the IETF.]

That seems like a good approach.  I'm also doing this for the first
time so your cooperation in helping me is greatly appreciated.
Elwyn I think this draft is NOT currently in a suitable state to
Elwyn produce a well-defined experiment.  The main reason for
Elwyn this conclusion is that the experiment consists of enabling
Elwyn a meta-mechanism and suggesting something the IESG might
Elwyn possibly do with this power rather than explicitly stating
Elwyn that this is what the IESG should put in place.  


I'd like to focus

Re: Gen-art review of draft-hartman-mailinglist-experiment-01.txt

2006-03-07 Thread Elwyn Davies

Hi.


Sam Hartman wrote:

I am happy to make a change similar to the one you propose in section
1.

I'm happy to split the parts of section 4 dealing with what the IESG
might do into their own section as an example.
  

That's fine by me.. it should make a self-consistent document.

I do not want to remove them completely.

Would that be OK
  


As regards gen-art I think it would be fine.

Ultimately I am only a small part of the consensus as regards the 
experiment proposed.
Personally, I would prefer that we didn't have to waste inordinate 
amounts of time on mailing list management.  Unfortunately knocking 
virtual heads together isn't very effective.


/Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations' to Proposed Standard

2006-02-26 Thread Elwyn Davies

Bill Strahm wrote:

Robert Elz wrote:

I cannot see why there's a debate going on here.   If someone, anyone,
can read a spec, and, in good faith, point out a possible ambiguity in
the text, before the doc is finalised, and if fixing it to avoid the 
problem is easy, what possible justification can there be for not 
adding a few

words to clarify things, and make sure that confusion does not happen?

Whenever someone points out a problem like this, the response should be
something like OK, if we write it like ... does that make it clear? or
perhaps What would you suggest as clearer wording? but never It is
clear enough as it is as the latter is already demonstrated to be 
false.


My mother can't read internet drafts either.  Should we change our 
language so that my mother can read and comprehend them.


It is assumed that there is a baseline knowledge when we write 
drafts... If you don't know how MIBs work in general - there are a LOT 
of problems that you have to sort out before you can provide technical 
feedback to the community.  Someone who is practiced in the art of 
reading/writting/implementing MIBs isn't going to have a problem with 
strictly monotonically increasing Indexes - knowing what that means, 
and how to implement it and test the implementation for correctness.


Somone who has been watching a rant on the list recently invovling the 
work monotonically increasing, MIGHT see the word and get confused.  I 
am not to worried about that - the document really isn't for their 
eyes anyway (I'm not about to comment on various security drafts 
either - should they be simplified so I can understand them, I hope I 
am expected to put in the work so that I understand them instead)



There is a fine line between endeavouring to make drafts and RFCs 
comprehensible to the casual, but technically competent, reader and 
requiring them to spell out every last convention and piece of 'common 
knowledge'.  The problem, in my experience as a gen-art reviewer, is 
that most drafts are created and reviewed by what are essentially closed 
communities (smaller than the total IETF and certainly smaller than the 
technical community that might expect to read these documents).  These 
communities share a common set of assumptions and 'jargon'.  This 
occasionally (well actually, quite frequently) results in pieces of text 
which may well be clear to those immersed in the particular art today, 
but that are less than clear to somebody with a reasonable grounding but 
not an intimate knowledge of the subject (such as MIBs) (i.e, me in the 
first instance, and, hopefully, lots of new implementors over the next 
few years).


On the other hand, I would expect the audience to be literate and use a 
dictionary if a word is unfamiliar (as it might be given that not all 
our readers have English as a first language or mathematical training).  
So I am quite happy if a precise word which I can find in the dictionary 
is used correctly.  Or alternatively there is an upfront pointer to a 
clear definition of the term.


Authors should be expecting that their works will be read by people who 
need to get the background right as well as those actually studying 
every line, so it is best to use clear and unambiguous language if at 
all possible:  accordingly I agree wholeheartedly with the next comment...
Certainly it is possible to explain the wording on the list, and 
convince

the objector that very careful understanding of the context makes the
intent clear - but that does nothing for the next person who comes along
and makes the same interpretation mistake (perhaps without even
realising the possibility for ambiguity, but simply interpreting the 
text

a different way).
For the record, although there is some discussion about monotonic vs 
strictly monotonic, all the cases which I looked at appeared to be used 
(mathematically and linguistically) correctly and unambiguously, given 
the surrounding words (since strictly monotonic sequences are also 
monotonic).  In cases where timestamps are involved it has to be 
monotonic anyway since we don't have clocks with infinitesimal 
resolution or arbitrarily large numbers of bits to represent timestamps.


Regards,
Elwyn




Bill

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-art review of draft-hartman-mailinglist-experiment-01.txt

2006-02-21 Thread Elwyn Davies

I was selected as General Area Review Team reviewer for this specification
(for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Document: draft-hartman-mailinglist-experiment-01.txt
Intended Status: Experimental (RFC3933 Process Experiment)
Shepherding AD: Brian Carpenter
Review Trigger: IETF Last Call ending 15 March 2006

Summary:
[Note: This is the first time that I have done a Process Experiment 
review and I will have to stretch the usual review criteria a bit.  
Basically I believe I should be looking for internal self-consistency, 
consistency with associated processes and likelihood of damage to the 
functioning of the IETF.]


I will disregard all matters of the appropriateness or otherwise of the 
timing of this experiment vis-a-vis any discussion of ongoing PR 
actions. This review will only consider the merits of the proposal itself.


I think this draft is NOT currently in a suitable state to produce a 
well-defined experiment.  The main reason for this conclusion is that 
the experiment consists of enabling a meta-mechanism and suggesting 
something the IESG might possibly do with this power rather than 
explicitly stating that this is what the IESG should put in place.  My 
reading of s7.2 of the IESG Charter [RFC3710] is that the IESG has the 
power to do this sort of thing already anyway.  Were the suggested 
mechanisms eventually adopted, I would have some qualms about the 
possibility of indefinite bans being possible without allowing a wider 
(possibly IETF as opposed to IESG) consensus, but that point is 
currently moot as the actual proposals that would be put in place are 
not specified by this document.


[Aside: Posting policies will need to start covering wikis and issue 
trackers in the immediate future!]


Review:

s1:
I think that this section of the last paragraph of s1 
overstates/mis-states what this document actually does:


This memo is an RFC 3933[RFC3933] experiment to provide
   the community with additional mechanisms to manage its mailing lists
   while the community decides what mailing list guidelines are
   appropriate.  IN particular this experiment creates a level of
   sanction between RFC 3934 and RFC 3683 for working group lists and
   creates sanctions other than RFC 3683 for non-working-group lists.


In practice all that s4 mandates is:


During the
   experiment period, the IESG MAY approve  other methods of mailing
   list control besides those outlined in RFC 3683 and RFC 3934 to be
   used on a specified set of IETF mailing lists.

i.e., it enables a meta-mechanism.  s4 then goes on to suggest some 
things the IESG *might* adopt (second half of para 1 and all of para 2 
of s4) and the procedures that it must go through to get them adopted.  
The result of this is (in the first instance) merely the provision to 
allow the IESG to decide to do something.  I don't think this 
constitutes a well-formed experiment.


s3:  The section


   ... and
   any mailing list hosted on any site or system operated by the IASA or
   otherwise on behalf of the IETF.

still leaves considerable scope for discussion of whether some mailing 
lists associated with IETF stuff would be covered.  In particular I am 
thinking of pre-BOF lists and auxiliary WG mailing lists which are not 
hosted on IETF controlled systems but are discussing IETF related stuff.


s3: The following sentence 'Mailing lists listed at 
https://datatracker.ietf.org/public/nwg_list.cgi are explicitly included 
in this definition.'  has been specifically crafted to catch some of the 
lists where there are currently problems even though these lists are not 
actually hosted on IETF controlled systems.  Although I am not aware of 
any specific problems, there could be potential legal minefields in the 
IETF attempting to manage (especially retrospectively) posting rights on 
mailing lists which are not hosted on IETF hardware.  Some existing WG 
mailing lists are also not hosted on IETF hardware.


s4: Para 2 talks about 'managers' of lists.  This term has not been 
defined - in particular non-WG lists only have administrators (aka 
owners in some cases).


s4, next to last para: The piece about last calls appears to confuse 
last calls relating to the specification of procedures and last calls 
relating to specific PR-actions (as mandated by  RFC3683 but not 
required by RFC2418).  The initial part of the para appears to be 
talking about the  definition of the powers and procedures which the 
IESG takes and decides to follow but this metamorphoses into 
consideration of individual 'procedures' taken under the resulting 
procedures.. too many 'procedures'!  In my view the Last Call which has 
provoked this review really ought to be arriving at consensus on the 
additional procedures currently 'suggested' in the second half of para 1 
and in para 2 of s4 of this document, and the next to last para of s4 
should just state that any actions taken under these 

Re: 'monotonic increasing'

2006-02-17 Thread Elwyn Davies

Hi.

Tom.Petch wrote:

The phrase 'monotonic increasing' seems to be a Humpty-Dumpty one, used with a
different sense within RFC to that which I see defined elsewhere; and this
could lead to a reduction in security.

Elsewhere - dictionaries, encyclopaedia, text books -  I see it
defined so that when applied to a sequence of numbers, then each number is not
less than its predecessor, so that
1 1 1 1 1 1 1 1 1 1
1 1 2 3 5 8 13
1 2.71828 3.14159 4.18 42
are all monotonic increasing sequences whereas
1 2 3 4 5 6 7 9 8 10
is not.
  
On the definition of monotonic increasing: I just checked my memory with 
my copy of Apostol (Mathematical Analysis, vintage 1968 or so) and 
monotonic increasing implies element (n+1) greater than or equal to 
element n for all n.  'Strictly monotonic increasing' implies greater 
than.  On line 
http://www-history.mcs.st-and.ac.uk/~john/analysis/Lectures/L8.html 
confirms this.

Within RFC, mostly those related to security or network management, the context
of its use implies, in addition, one or more of
a) each number in the sequence is different (as in number used once)
b) each number is an integer
c) each number is one greater than its predecessor (as in message sequencing) .

Most likely, an implementation that conforms to the rest of the world definition
would interwork with one that conforms to the RFC one, but with some loss of
security, since numbers that are intended to be used only once could be reused.

Q1) Can anyone point me to an authoritative source that endorses the RFC usage?

Q2) Even so, since the  rest of the world usage seems to be so widely defined,
should we change our terminology, eg specifying seqences to be strictly
increasing when that is what is needed?

  
I just did a full text search of all the RFCs using the zvon repository 
which covers up to RFC3999.  the fragment 'monotonic' (including 
'monotonically') appears in RFCs 1323, 1379, 1644, 1889, 2326, 2681, 
3571 and 3550.  All these cases (either about timestamps or TCP sequence 
numbers)  appear to use monotonically increasing in line with the 
mathematical definition although it is possible that a couple of them 
(e.g., RFC3571, s4) ought to use strictly monotonic, although the usage 
is clear from the additional words.


In many cases the phraseology is explicitly used because the sequence 
(of tiimestamps used, for example)  does not have every possible integer 
represented.


Do you have a concrete example of your problem?

Regards,
Elwyn

 Tom Petch


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
  


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: 'monotonic increasing'

2006-02-17 Thread Elwyn Davies




Hmm! I don't think I see your problem with any of the usages in the
RFCs mentioned. In all cases monotonically is used to express that the
sequence is non-decreasing which is in line both with the mathematical
definition and the Merriam-Webster online dictionary #2 sense. In some
of the cases the sequence required is actually strictly monotonically
increasing but the other words make this clear, and since strictly
monotonic sequences are also monotonic, it is not wrong. The only one
where there could be (IMO) a soupon of doubt is RFC2679 where it isn't
absolutely clear whether or not T in the (n+1)-th pair needs to be
strictly greater than T in the nth pair, and I suspect it doesn't
matter in this case - it certainly wouldn't break interoperability.

Regards,
Elwyn

Tom.Petch wrote:

  Elwyn

To be more concrete, I have some 1800 RFC readily available and find monotonic
in 54 of them from RFC677 (1975) to RFC4303.

Plucking a few at random, RFC3412 (SNMP) suggests that monotonic increasing
would avoid reuse while RFC2406 (IPsec) suggests monotonic increasing can be
used in the context of replay attacks.  (I accept that in the latter, as in many
cases, understanding the context, the whole document or set of RFC, does imply
that the sequence should be strictly increasing).  RFC2679 (IPPM) is more
mathematical in its approach, where I would expect the term to be informed by
its use in mathematical textbooks, but it appears not to be

Tom Petch

- Original Message -
From: "Elwyn Davies" [EMAIL PROTECTED]
To: "Tom.Petch" [EMAIL PROTECTED]
Cc: "ietf" ietf@ietf.org
Sent: Friday, February 17, 2006 8:19 PM
Subject: Re: 'monotonic increasing'


  
  
Hi.

Tom.Petch wrote:


  The phrase 'monotonic increasing' seems to be a Humpty-Dumpty one, used with
  

  
  a
  
  

  different sense within RFC to that which I see defined elsewhere; and this
could lead to a reduction in security.

Elsewhere - dictionaries, encyclopaedia, text books -  I see it
defined so that when applied to a sequence of numbers, then each number is
  

  
  not
  
  

  less than its predecessor, so that
1 1 1 1 1 1 1 1 1 1
1 1 2 3 5 8 13
1 2.71828 3.14159 4.18 42
are all monotonic increasing sequences whereas
1 2 3 4 5 6 7 9 8 10
is not.

  

On the definition of monotonic increasing: I just checked my memory with
my copy of Apostol (Mathematical Analysis, vintage 1968 or so) and
monotonic increasing implies element (n+1) greater than or equal to
element n for all n.  'Strictly monotonic increasing' implies greater
than.  On line
http://www-history.mcs.st-and.ac.uk/~john/analysis/Lectures/L8.html
confirms this.


  Within RFC, mostly those related to security or network management, the
  

  
  context
  
  

  of its use implies, in addition, one or more of
a) each number in the sequence is different (as in number used once)
b) each number is an integer
c) each number is one greater than its predecessor (as in message
  

  
  sequencing) .
  
  

  Most likely, an implementation that conforms to the rest of the world
  

  
  definition
  
  

  would interwork with one that conforms to the RFC one, but with some loss of
security, since numbers that are intended to be used only once could be
  

  
  reused.
  
  

  Q1) Can anyone point me to an authoritative source that endorses the RFC
  

  
  usage?
  
  

  Q2) Even so, since the  rest of the world usage seems to be so widely
  

  
  defined,
  
  

  should we change our terminology, eg specifying seqences to be strictly
increasing when that is what is needed?


  

I just did a full text search of all the RFCs using the zvon repository
which covers up to RFC3999.  the fragment 'monotonic' (including
'monotonically') appears in RFCs 1323, 1379, 1644, 1889, 2326, 2681,
3571 and 3550.  All these cases (either about timestamps or TCP sequence
numbers)  appear to use monotonically increasing in line with the
mathematical definition although it is possible that a couple of them
(e.g., RFC3571, s4) ought to use strictly monotonic, although the usage
is clear from the additional words.

In many cases the phraseology is explicitly used because the sequence
(of tiimestamps used, for example)  does not have every possible integer
represented.

Do you have a concrete example of your problem?

Regards,
Elwyn


   Tom Petch


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

  

  
  
  



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Knowing what BOFs are being thought about [was: Re: IETF 65 BOF Announcement: Digital Identity Exchange (DIX)]

2006-02-10 Thread Elwyn Davies
Finding out what BOFs are being plotted is not very easy AFAIK.  In the 
case below there doesn't appear to have been any widespread public 
announcement of the start of the mailing list and I suspect that is the 
case for many others.


Obviously an announcement of intent to the IETF list or the Announce 
list is one way for people to tell the world. For those who can't cope 
with the traffic on the IETF list and to provide a more permanent 
reminder, it would help to have a 'prospective new work' page on the 
IETF web site where new pre-BOF mailing lists could be publicised with a 
time limit so the advert is removed at the end of 1st or 2nd IETF 
meeting after it was first started (or when a BOF occurs or the WG 
starts up) to avoid the list getting overly long.


Regards,
Elwyn

Scott Hollenbeck wrote:

-Original Message-
From: Richard Shockey [mailto:[EMAIL PROTECTED] 
Sent: Friday, February 10, 2006 10:39 AM

To: John Merrells
Cc: ietf@ietf.org; Ted Hardie; Hollenbeck, Scott; Lisa Dusseault
Subject: Re: IETF 65 BOF Announcement: Digital Identity Exchange (DIX)

John Merrells wrote:


Name of the BOF
  
I dont see a preliminary discussion list on this BOF. That's IMHO is 
customary.



There's a list that's been around since approximately Vancouver.  Archives
included:

https://www1.ietf.org/mailman/listinfo/dix

I'll let John answer your other questions. ;-)

-Scott-


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
  


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Finding issue trackers for drafts

2006-01-30 Thread Elwyn Davies

Hi.

One additional piece of information relating to drafts that ism't 
included in the drafts database is the location of the issue tracker (if 
any).  They aren't all in one place at the moment which makes life more 
difficult than necessary for the casual inspector... for example...


- I was just faced with an email relating to a l2vpn document which I 
reviewed for the gen-art team which stated that 'there were some issues 
in the issue tracker' but no note of where I could locate the tracker.  
Now clearly I can bug the authors but I am sure they have better things 
to do.


- I know where to find some of the nsis issue trackers but I also know 
they aren't obvious to a casual observer.


So two thoughts:
- Could this information be collated on the info pages (subject to a 
good way of finding it out)?
- Would it be a good idea to incorporate the location of the issue 
tracker into drafts as a matter of course (might even encourage their use)?


xml2rfc might be able to provide some sort of support perhaps but that 
isn't essential.


Regards,
Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: how to declare consensus when someone ignores consensus

2006-01-23 Thread Elwyn Davies


[EMAIL PROTECTED] wrote:



Can you imagine if during every murder trial they had a debate on the 
humanity of capitol punishment?


As a non-US citizen, I am a little hazy about some details of the US 
legal system.  Do I assume that this punishment requires the malefactor 
to sit through a set period of congressional filibusters?


I look forwards to a Supreme Court ruling outlawing it as a cruel and 
unusual punishment. 


Regards,
Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Ietf Digest, Vol 21, Issue 63

2006-01-21 Thread Elwyn Davies
, in the sense that it is intended to server as a firewall
against misbehaviour by routing domains outside the core.  It is true, as
Mike StJohns says, that EGP is not a routing protocol; it is also true that
this fact has led to serious restrictions in topology and therefore a
crash effort is being mounted to replace EGP with a routing protocol, under
the direction of the INENG and INARCH task forces. 


However, maybe we are asking too much of EGP.  Perhaps we are trying to
make it a technical fix for administrative problems.  To avoid bad things
like oscillations and routing loops in the face of the diversity (to
use a nice word) of the Internet as a whole, EGP or whatever replaces it
will always have to use long time constants and provide some sub-optimal
routes.  At the present time, the Internet is growing largely by
accretion of new Autonomous Systems, and this must lead to some 
degradation as you cross boundaries.  If we want better overall

performance, we need to persuade these systems to aggregate into bigger
systems, each run by centralized and professional Internet management,
and each using a carefully-optimized IGP.

I go into all this polemic, because lately I have been exposed to an 
awful lot of technological optimism (ask NASA about that!) about 
Internetting.  I wish we could convince some of the new players in the

Internet game that it takes great technical sophistication and wisdom
to make this stuff work well.  The Anarchy Model of Internetting,
while theoretically feasible due to EGP, is not really a very wise way
to go.

Bob Braden

=

regards,
Elwyn Davies




Marshall Eubanks wrote:

While we are on the subject, in the archives of the IETF there are  
proceedings of one Internet Architecture Task Force meeting, in May,  
1986.


Can anyone fill me in on this entity and what happened to it ?

Regards
Marshall Eubanks

On Jan 16, 2006, at 2:51 PM, Patrice Lyons wrote:


Bob,

They are talking about the first IETF meeting as taking place on  
Jan. 16, 1986.  What about the IETF meeting as one of the several  
task forces that Barry Leiner put together while you were still at  
DARPA?  There was also the working group series that preceded the  
IETF.  I recall that Jon Postel had kept the records of this work  on 
the early Internet.  Also, do you plan to go to Dallas?  The  last 
message to Harold mentions some agreement reached at Tunis  with 
respect to IETF work with the to be formed Internet Governance  Forum 
(at least I think that is what it is going to be called) (see  early 
work on it at http://www.intgovforum.org/.


Patrice
- Original Message - From: [EMAIL PROTECTED]
To: ietf@ietf.org
Sent: Monday, January 16, 2006 10:40 AM
Subject: Ietf Digest, Vol 21, Issue 63



--

Message: 6
Date: Mon, 16 Jan 2006 11:14:48 +0100
From: Brian E Carpenter [EMAIL PROTECTED]
Subject: An important day for the IETF
To: IETF discussion list ietf@ietf.org
Message-ID: [EMAIL PROTECTED]
Content-Type: text/plain; charset=us-ascii; format=flowed

Greetings,

The first IETF meeting took place 20 years ago today,
on January 16th, 1986, in San Diego, California. There were
21 attendees and Mike Corrigan was in the chair.

The IETF has come a long way since then. We'll celebrate
this in fine style during the 65th IETF meeting in
Dallas, Texas from March 19 to 24, 2006.

   Brian Carpenter
   IETF Chair No. 6

--

Message: 7
Date: Mon, 16 Jan 2006 12:30:13 +0100
From: Harald Tveit Alvestrand [EMAIL PROTECTED]
Subject: Re: An important day for the IETF
To: Brian E Carpenter [EMAIL PROTECTED], IETF discussion list
ietf@ietf.org
Message-ID: [EMAIL PROTECTED]
Content-Type: text/plain; charset=us-ascii

Happy birthday, IETF!

And remember to raise an extra toast to Mike St. Johns, who should be
coming to his 63rd or so IETF meeting in Dallas. for some of  
us, this

has gotten to be a habit!

Wonder how many of the original 21 are still around

Harald, attendee since #22 (but missed #29)

--On 16. januar 2006 11:14 +0100 Brian E Carpenter  
[EMAIL PROTECTED]

wrote:


Greetings,

The first IETF meeting took place 20 years ago today,
on January 16th, 1986, in San Diego, California. There were
21 attendees and Mike Corrigan was in the chair.

The IETF has come a long way since then. We'll celebrate
this in fine style during the 65th IETF meeting in
Dallas, Texas from March 19 to 24, 2006.

Brian Carpenter
IETF Chair No. 6



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf





--

Message: 9
Date: Mon, 16 Jan 2006 16:00:12 +0100
From: Harald Tveit Alvestrand [EMAIL PROTECTED]
Subject: Re: An important day for the IETF
To: Noel Chiappa [EMAIL PROTECTED], ietf@ietf.org
Message-ID: [EMAIL PROTECTED]
Content-Type: text/plain; charset=us-ascii; format=flowed



--On mandag, januar 16, 2006 09:39:36

Re: A plug for XXE (Re: Alternative formats for IDs)

2006-01-15 Thread Elwyn Davies

Seconded.

I *have* used it for a production run and whilst it is not perfect it
makes document creation and editing significantly easier than typing
'raw' xml even into a syntax-aware text editor.

It is also very helpful for proof reading and commenting (spell checker
provided).

And the standard version is free.. and supported on Windows, Linux and Mac.

I used to use the Word template but the freedom from hassle of generating the 
final documents, the ease of generating references and support of complex 
numbered lists (almost impossible to achieve in Word) makes

xxe/xml2rfc my current tool chain of choice and means I am never going back to 
Word.

Regards,
Elwyn
(addict)


Harald Tveit Alvestrand wrote:




--On 13. januar 2006 11:44 -0800 Joe Touch [EMAIL PROTECTED] wrote:


This is my impression, from trying to use it as well. I was troubled by
'yet another embedded text system' that necessitated editing source,
which seemed like a stone-age throwback when I abandoned such systems in
the mid 1980s (Scribe, nroff, etc. at the time).

While I appreciate that, in theory:

1. there are WYSIWYG XML editors that *can* be loaded with DTDs
2. Word et al. are moving to XML



Bill Fenner has made a plugin available for the XMLMind XML Editor 
that gives you a lot of assistance in writing XML2RFC documents.


I haven't used it for production yet, but it looks wonderful - not 
WYSIWYG, but WYSIPU - What You See Is Pretty Useful.


Details on http://rtg.ietf.org/~fenner/ietf/xml2rfc-xxe/

  Harald





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
 




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: A plug for XXE (Re: Alternative formats for IDs)

2006-01-15 Thread Elwyn Davies

Seconded.

I *have* used it for a production run and whilst it is not perfect it 
makes document creation and editing significantly easier than typing 
'raw' xml even into a syntax-aware text editor.


It is also very helpful for proof reading and commenting (spell checker 
provided).


And the standard version is free.. and supported on Windows, Linux and Mac.

I used to use the Word template but the freedom from hassle of 
generating the final documents, the ease of generating references makes 
xxe/xml2rfc
and support of complex numbered lists (almost impossible to achieve in 
Word) means I am never going back.


Regards,
Elwyn
(addict)


Harald Tveit Alvestrand wrote:




--On 13. januar 2006 11:44 -0800 Joe Touch [EMAIL PROTECTED] wrote:


This is my impression, from trying to use it as well. I was troubled by
'yet another embedded text system' that necessitated editing source,
which seemed like a stone-age throwback when I abandoned such systems in
the mid 1980s (Scribe, nroff, etc. at the time).

While I appreciate that, in theory:

1. there are WYSIWYG XML editors that *can* be loaded with DTDs
2. Word et al. are moving to XML



Bill Fenner has made a plugin available for the XMLMind XML Editor 
that gives you a lot of assistance in writing XML2RFC documents.


I haven't used it for production yet, but it looks wonderful - not 
WYSIWYG, but WYSIPU - What You See Is Pretty Useful.


Details on http://rtg.ietf.org/~fenner/ietf/xml2rfc-xxe/

  Harald





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: A plug for XXE (Re: Alternative formats for IDs)

2006-01-15 Thread Elwyn Davies



Joe Touch wrote:


Elwyn Davies wrote:
 


I used to use the Word template but the freedom from hassle of
generating the final documents
   



I'm not sure what freedom this means; XML still needs to run through a
script, just as Word does.
 

you can't do it from inside Word and in my experience the Word process 
broke about 80% of the time (mostly due to the generic text printer 
being horribly buggy) but maybe it is better now since I gave up with 
Word some time ago. [Microsoft were never interested in fixing these 
bugs - reducing some lines to heights of a fraction of a point and 
rendering one character per line in an apparently random fashion - and 
they persisted across multiple releases of Word.]


 


the ease of generating references
   



Commercial software allows BIBTEX references to be imported into
citation databases, so this is moot as well.

 

I am sure I could buy some tools but how well integrated with Word would 
this be and how much would it cost me?



makes
xxe/xml2rfc
and support of complex numbered lists (almost impossible to achieve in
Word)
   



I checked your three current I-Ds and five RFCs, and the most complex
numbering I saw was G1, G2, ..., P1, P2..., and paragraphs numbered
G.1:, G.2: Word has been able to handle all of these since the
late 1980's. Was there a more complex example I missed, or one in a
pending document that hasn't been issued that you could give as an example?
 



In theory.. my experience was that multiple sets of numbered paragraphs 
spread across sections was painful and error prone.


But ultimately it was just the level of repeated niggles and panics when 
conversion fails close to the I-D deadline that I don't get with xml2rfc 
and especially with xxe.


Don't let me stop you using Word but I know which set of tools I prefer.

Elwyn


Joe

 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


IETF Trust last call

2005-12-08 Thread Elwyn Davies
Apologies for the last minute query - I have only just returned from an 
extended holiday.


Two points came to mind when I read the Trust document:

s2.1, Purpose: The phrase 'used in connection with the Internet 
standards process and its administration' doesn't seem to be very 
explicit about the IPR created by the process (which is after all what 
the IETF is supposed to be about).  At first reading it sounds to be 
just about the peripheral stuff related to the process.  Not being an 
IPR  lawyer I would not be sure how broadly the phrase would be 
interpreted legally, but I thought I would ask.


Appendix A:  I was somewhat surprised that this section doesn't 
explicitly mention any software used as part of the operations and 
process.  Maybe this is covered by some other part of the IASA agreements?


Regards,
Elwyn Davies

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-ipsec-ikev2-17.txt

2005-10-27 Thread Elwyn Davies

Roland

Looking at the RFC Editor queue, it looks as if this is the only 
document in the complex web of interdependencies between rfc2401bis and 
ikev2 and their related documents that is still in the EDIT state.  All 
the others appear to be in REF state waiting for it to finish editing.  
Why this one, which was one of the earlier arrivals in the queue, is now 
the blockage cannot be deduced from the database.  It would certainly 
clear out a big chunk of queue (and would fill in a big hole in the 
security standards scene) if it could be finished!


Elwyn

Eliot Lear wrote:


Roland,

Looking at the snippet of the RFC queue you provided, the draft 
blocked on a normative reference to draft-ietf-ipsec-rfc2401bis, which 
entered the queue in April.  It references a bunch of other stuff,  
but they're all earlier in the queue, and I don't think they're 
blocked.  I think Bill Fenner has a tool somewhere that graphs this 
stuff.



Eliot


So currently the ID Tracker says it is in the RFC Editor Queue.

2004-10-04draft-ietf-ipsec-ikev2-17.txt
EDIT
REFdraft-ietf-ipsec-rfc2401bisIN-QUEUE
C. Kaufman, Ed.
Internet Key Exchange (IKEv2) Protocol
Bytes: 268610
Working Group: IP Security Protocol

This is now over a year?! contributing to the
heavy tail distribution :-) I really don't
want to blame the RFC editor (you have a
tremendous workload) or anyone else
for this. I just wanted to know whether
there are (whatever) problems that hinder
progress.

 Roland

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF Meeting Venue Selection Criteria

2005-10-14 Thread Elwyn Davies



Ole Jacobsen wrote:


On Thu, 13 Oct 2005, Hallam-Baker, Phillip wrote:

 


How about adding that the mean outdoor temperature at the time of the
year the meeting is being held should be above 0 degrees Centigrade? 

   



Why?

There is some logic in this.. Participants need to be able to get from 
airport to hotel to venue on foot/public transport without needing to 
bring excessive personal protection gear that they might not otherwise 
own, or experiencing heat stroke because they aren't used to the 
temperature/humidity (oh, and touristing before/after isn't much fun 
either).


Another related criterion is that the expected weather is not going to 
produce a high risk of transport disruption.. southern USA in the 
hurricane season???  continental Canada in December???  Asia in the 
monsoon season??? whereever in the peak holiday influx season for that 
region???


More importantly, the venue must be able to maintain a sensible 
temperature/humidity in the conference rooms (20-23 deg  C, 50% Relative 
Humidity).  Remember that the side effect of allowing 80% of people to 
plug in their laptops is that each of them may be dissipating an extra 
150-200 watts of heat into the room over and above what the human body 
does.  This is actually more than doubling the heat load into the room, 
and cooling systems may not be able to cope - the IETF is an unusual 
body and it imposes cruel and unusual punishment on cooling systems.  
Sitting for a week in excessively warm and humid rooms is not pleasant 
(working efficiency falls off even at 26C).  For example, the Paris 
meeting turned out ok because the outside temperature dropped right 
about when the actual conference began, but I was at an Interop event in 
the same building the previous week when the temperatures were much 
higher, and being in one of the smaller rooms with lots of bodies and 
more computers was unpleasant.. the cooling just wasn't coping.   My 
mind has blanked out the location, but we had a very unpleasant week in 
a US venue two or three years ago when the cooling couldn't cope.

Reference:
http://ergo.human.cornell.edu/studentdownloads/DEA350notes/Thermal/thcomnotes1.html
http://ergo.human.cornell.edu/studentdownloads/DEA350notes/Thermal/thcomnotes2.html
http://ergo.human.cornell.edu/studentdownloads/DEA350notes/Thermal/thcondnotes.html

Other health risks: Would participants need vaccinations before 
attending?  Is it in a malaria risk area?  Are there other infectious 
disease hazards or nuisances - e.g., West Nile fever, Lyme disease, 
Scottish Highland midges.  Even if visas are not required are there any 
health checks at immigration?


The airport (and/or other wide area transport links) need to have 
adequate capacity and decent connections.. probably not an issue if the 
venue is sufficiently large but worth checking.


The criteria say nothing about accessibility for the differently able.

There is also the matter of break time refreshment provision.. 
succouring 1300 thirsty, half-starved nerds (sorry, IETFers) two or 
three times a day at a reasonable cost can be a challenge.


You need to differentiate the technical requirements of the venue from 
what the network providers need to do there are some fuzzy edges 
here e.g., the WAN links


Editorial note: You should flag up that continental European conventions 
are in use for numbers.


Regards,
Elwyn

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF Meeting Venue Selection Criteria

2005-10-14 Thread Elwyn Davies



Jari Arkko wrote:


Elwyn Davies wrote:

There is some logic in this.. Participants need to be able to get 
from airport to hotel to venue on foot/public transport without 
needing to bring excessive personal protection gear that they might 
not otherwise own, or experiencing heat stroke because they aren't 
used to the temperature/humidity (oh, and touristing before/after 
isn't much fun either).



Lets just not specify anything here. Its not like the secretariat
would be blindly executing our rules and ending up selecting
the Antarctica for the next IETF location. (They wouldn't because
the hotel capacity is insufficient.) In other places, you can
probably manage short exposure to the elements, particularly
if you happen to check beforehand which part of the world you
are going to. And yes, this might mean investment to protective
gear such as a hat, jacket or a tube of SPF 40. Or a taxi ride.

And I've found that touristing is more interesting in extreme
conditions.


You don't want exact rules..but preferring a 'temperate' temperature 
range or avoiding likely real extremes is a criterion for choosing one 
veue over another.




More importantly, the venue must be able to maintain a sensible 
temperature/humidity in the conference rooms (20-23 deg  C, 50% 
Relative Humidity). 



This is more important. I feel that the rooms are mostly too cold
(probably tuned for business suits, not t-shirts).


Interesting.. I have not yet found anything cooler than nicely 
comfortable for me - mostly they are far too hot for my taste but 
doubtless that might be something to do with BMI!  Seriously, the 
population of laptops (plus the need for inter-seat spacing to 
accomodate laptop use) may mean that room sizes need to be larger than 
the nominal capacities that venues quote.  It would probably be sensible 
to quote the space per participant that we expect in meeting rooms and 
maybe something about chair layouts.




Other health risks: Would participants need vaccinations before 
attending?  Is it in a malaria risk area?  Are there other infectious 
disease hazards or nuisances - e.g., West Nile fever, Lyme disease, 
Scottish Highland midges.  Even if visas are not required are there 
any health checks at immigration?



Its really better that people check with their own doctors about this.
I at least check before weird trips from our local clinique what the
vaccination recommendations are.


Absolutely, but choosing a venue where most people (e.g.) ought to be 
popping malaria prevention pills is something that needs to be thought 
about.. it means participants need more advance planning and last minute 
decisions might not be possible (as with visas).





The criteria say nothing about accessibility for the differently able.



This should be a requirement.

Editorial note: You should flag up that continental European 
conventions are in use for numbers.



What numbers?


e.g., I take it that 1.300 means we average 13e2 rather than 13e-1 
participants.


Regards,
Elwyn



--Jari



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: p2p dns (was: Re: UN plans to take over our job!)

2005-09-30 Thread Elwyn Davies
Johan: I imagine you have seen this paper on the subject of a p2p DNS 
substitute based on CHORD, but it is interesting reading for others.

http://www.cs.rice.edu/Conferences/IPTPS02/178.pdf

Regards,
Elwyn Davies

Johan Henriksson wrote:

 


On Fri, Sep 30, 2005 at 08:45:29AM +0200,
Johan Henriksson [EMAIL PROTECTED] wrote
a message of 25 lines which said:

   


a peer 2 peer replacement for DNS tops my internet wish list;
 


Is it a formal call to a new WG? Please provide a candidate charter :-)
   


I'd subscribe immediately :-)

is there an interest? I don't have much experience of IETF, much less in
taking care of a wg. but if more people would want to work on such a
thing, I could look into how to start up such an endeavor.

(although I doubt it would grow into a substitute in the end; rather a
complement)

- Johan Henriksson




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Comments on draft-iab-link-indications-03.txt

2005-09-23 Thread Elwyn Davies

Hi.

I did a quick read of this document and have a couple of general 
comments (plus I spotted a very few trival nits).


It seems to be a very useful survey of what has been done in the area of 
Wireless LAN and the interactions of link indications for hosts 
connected directly to such links. The architectural concerns and 
recommendations are then principally derived from this area of study - I 
agree generally with what is said in these recommendations in the 
primary situation investigated but I am not sure if the conclusions 
would be modified if other situations were more explicitly considered.


I am not sure without much deeper thinking and indeed a deeper knowledge 
of the types of links whether the characteristics of the various mobile 
phone links (which are very briefly mentioned) would have much of an 
impact on the conclusions.  Their behaviour is significantly different 
from that of WLAN and given the rather limited performance of the 
browser on my mobile phone I wonder if more advice is needed here!


Similarly Bluetooth and other sorts of short range communication; and 
802.16 type links don't get much consideration.


The draft implicitly concentrates on link indications directly into 
hosts where they can interact with the transport and application layers 
as well as the IP and routing control plane.  Carriage of link 
indications beyond the node where they are directly detected is rather 
frowned upon:  I think that some more analysis is needed  for situations 
where the wireless link attaches to a router (a mobile network such as a 
car or plane comes to mind) and the hosts attached to the wirelesss 
router don't see the link indications directly.  It occurred to me that 
the nsis work both needs the link indications (to help with rerouting) 
and could be effectively used to carry the indications - either as a 
on/off signal or as part of the QoS signaling to tell the application 
that the bandwidth it was going to get was not what it negotiated 
originally.


Another area whcih is not considered is the usage of link indications 
for traffic engineering.  There is quite a lot to be said about managing 
layered recovery where multiple link layers can provide both indications 
of failure and/or rerouting.  The total problem in this case is very 
complex (just which layer should do the rerouting?).


I also though that IPv6 was not considered very thoroughly.  The 
following sections should probably say more about IPv6:

s1.2: Routable addresses: what about IPv6 addresses?
s1.4.2: Needs to consider ICMPv6
ss2.3.1, 2.3.2, 2.3.3: Need to consider IPv6 address configuration


Minor point:
In s2.4: there should probably be some discussion of the controlability 
of TCP keepalives - most OS provide very rudimentary capabilities for 
controlling TCP keepalives and the usual default interval is totally 
useless for almost any real world application.


Editorial nits:
s2.1, para 3: (language difficult to parse) s/documents 
dependent/documents that describe capabilities that are dependent/

s2.2, para 5: s/head/heed/
s4.1, para 3: s/receiving/receive/
s4.3, para 1: s/particular/particularly/


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


  1   2   >