RE: [Sdn] FW: Last Call: draft-sin-sdnrg-sdn-approach-04.txt (Software-Defined Networking: A Perspective From Within A Service Provider) to Informational RFC

2013-10-09 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Linda Dunbar


 - We all understand the challenges of Full Automation. However, the
 SDN and Full automation are two separate angles to Carrier networks. I
 find the Section 4.1  Implications of full automation actually de-
 rails the focus of the draft on SDN.

[WEG] I strongly disagree. First, we all understand... is an 
overgeneralization, and a dangerous and grossly inaccurate one at that. Lots of 
SDN vendors have repeatedly demonstrated to me how little they actually 
understand about this problem. It's not a new problem by any means, but there's 
a really significant amount of hand-waving going on around the complexities of 
actually doing what they're saying is possible through the magic of SDN, when 
few have demonstrated how the abstract concept SDN actually makes solving 
this problem easier. The reality is that SDN and automation are inextricably 
linked. The next to last sentence in section 2.3 reinforces this, and I believe 
that 4.1 is absolutely appropriate for this draft. A truly software-defined 
network is an automated one, and any discussion of an operator's perspective on 
SDN is going to need to consider the same challenges that have been present in 
prior attempts to better automate network management, provisioning, and 
control. There are two models for managing a network like this, one that is 
fully automated, meaning that it is quite a lot more complex and susceptible to 
ghost in the machine problems, the other which has a human making most of the 
important decisions and then dictating those to the network. Even the latter 
model requires a significant amount of automation to execute what the human has 
decided should be done.
The things covered in section 4.1 mirrors a lot of the discussion that I have 
had both internally and with other operators around the challenges of 
separating the hype of SDN from the actual benefit, and in selling this model 
to operations folks who are skeptical of ceding control to a set of computer 
logic.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [sidr] Last Call: draft-ietf-sidr-origin-ops-21.txt (RPKI-Based Origin Validation Operation) to Best Current Practice

2013-09-26 Thread George, Wes
 From: sidr-boun...@ietf.org [mailto:sidr-boun...@ietf.org] On Behalf Of
 Randy Bush

 how about

To relieve routers of the load of performing certificate validation,
cryptographic operations, etc., the RPKI-Router protocol, [RFC6810],
does not provide object-based security to the router.  I.e. the
router may not validate the data cryptographically from a well-known
trust anchor.  The router trusts the cache to provide correct data
and relies on transport based security for the data received from the
cache.  Therefore the authenticity and integrity of the data from the
cache should be well protected, see Section 7 of [RFC6810].
[WEG] fine, though it's unclear if may in the above is intended to be 
normative. I think it's not, but just pointing it out.


As RPKI-based origin validation relies on the availability of RPKI
data, operators SHOULD locate RPKI caches close to routers that
require these data and services in order to minimize the impact of
likely failures in local routing, intermediate devices, long
circuits, etc.  One also should consider trust boundaries, routing
bootstrap reachability, etc.  E.g. a router should bootstrap from a
chache which is reachable with minimal reliance on other
infrastructure such as DNS or routing protocols.
[WEG] this is better, but I still maintain that in the first sentence, close 
isn't actually the goal we're trying for.

How about:

...operators SHOULD consider the relationship between the routers that require 
these data and services and the location of the RPKI caches in the network's 
topology. Caches SHOULD be located so that they can take advantage of 
geographic redundancy and minimize the impact of likely failures in local 
routing, 

And add this at the end to explain why reliance on routing protocols @ 
bootstrap is risky:

...or routing protocols. Reliance on routing protocol convergence to reach a 
cache at bootstrap time can result in significant increases in total 
convergence time as the router converges partially, synchronizes with the RPKI 
cache, and then must re-converge based on the data from the cache.


Thanks

Wes

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [sidr] Last Call: draft-ietf-sidr-origin-ops-21.txt (RPKI-Based Origin Validation Operation) to Best Current Practice

2013-09-26 Thread George, Wes
 From: Randy Bush [mailto:ra...@psg.com]

 i don't even know what geographic redundancy is, alternate earths?
[WEG] nah, the latency is too high until we sort out IP over Quantum 
Entanglement. ;-) Geographic redundancy in the context of things that live on 
servers is that it exists on servers in more than one physical location (e.g. 
Datacenter East and Datacenter West) so that there isn't a single point of 
failure. In this case, that'd probably be in the form of two caches backing 
each other up (router configured to use both).

 if
 you mean redundant network topology, i think it is more than that.  i
 really think physical line length matters.  as i said, the longer the
 circuit the more likely a boat anchor will whack it.  hence close.
[WEG] yes, but ultimately that's dependent on your network topology. If close 
is the only way to mitigate that (vs having a truly redundant backup that 
doesn't share any topology in its path), then sure, that's what you do. But I 
don't think it directly translates to should be close. We clearly disagree, 
but I'm not going to belabor the point any further.


 i think i understand what you want made more explicit.  today's try

To relieve routers of the load of performing certificate validation,
cryptographic operations, etc., the RPKI-Router protocol, [RFC6810],
does not provide object-based security to the router.  I.e. the
router can not validate the data cryptographically from a well-known
trust anchor.  The router trusts the cache to provide correct data
and relies on transport based security for the data received from the
cache.  Therefore the authenticity and integrity of the data from the
cache should be well protected, see Section 7 of [RFC6810].

As RPKI-based origin validation relies on the availability of RPKI
data, operators SHOULD locate RPKI caches close to routers that
require these data and services in order to minimize the impact of
likely failures in local routing, intermediate devices, long
circuits, etc.  One should also consider trust boundaries, routing
bootstrap reachability, etc.  E.g. a router should bootstrap from a
chache which is reachable with minimal reliance on other
infrastructure such as DNS or routing protocols.

For example, if a router needs its BGP and/or IGP to converge for the
router to reach a cache, once a cache is reachable, the router will
then have to reevaluate prefixes already learned via BGP.  Such
configurations should be avoided if possible.

[WEG] close enough, ship it.

Wes

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [sidr] Last Call: draft-ietf-sidr-origin-ops-21.txt (RPKI-Based Origin Validation Operation) to Best Current Practice

2013-09-25 Thread George, Wes
 From: Randy Bush [mailto:ra...@psg.com]

 are you really saying that i should be comfortable configuring a seattle
 router to use a cache in tokyo even though both are in my network and
 there is a pretty direct hop?
[WEG] not necessarily. But I'm also not saying that there would *never* be a 
scenario where that makes sense.

 i am willing to hack the text.  but i am just not sure that proximity is
 not a good attribute.  the longer the wire the greater the likelihood of
 it being cut.
[WEG] Proximity is generally a good attribute, but it's not free, so help the 
reader understand the tradeoffs so that they can justify spending money to get 
better proximity. The draft hasn't provided a good explanation of how proximity 
improves RPKI (or what problems a lack of it creates), nor how to determine 
whether the level of proximity in a given design is good enough to provide 
the perceived benefit.

Your statement about long wires being cut is an argument for redundancy and 
geographic diversity, not proximity. Of course an operator needs to take into 
account the topology of their network when considering geographic diversity, 
but that's not necessarily going to translate to a need for proximity.

The draft says one should consider latency, but never explains how increased 
latency impacts RPKI, nor gives any guidance on how much might be too much, 
especially when one considers that RPKI is an asymmetric system that changes on 
mostly human time-scales (order of hours or days). Most places where latency 
matters, it's a function of what RTT does to throughput or the perception of 
speed for interaction (how long it takes between when I click and when 
something happens). This isn't an interactive system. What is latency-sensitive 
in this system on the subsecond scale such that it can be affected by moving 
the cache closer? Even on systems configured for very frequent synchronization, 
are we expecting anything to change on that timescale?

See my other response to CMorrow for questions around bootstrapping.

Wes

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [sidr] Last Call: draft-ietf-sidr-origin-ops-21.txt (RPKI-Based Origin Validation Operation) to Best Current Practice

2013-09-25 Thread George, Wes
 From: christopher.mor...@gmail.com [mailto:christopher.mor...@gmail.com]

 [CLM]
 In the RPKIcache example, 'consumer' is 'routers in your network'.
 'Close' is 'close enough that bootstrapping isn't a problem', balanced
 with 'gosh, maybe I don't want to put one on top of each router! plus
 associated management headaches to deal with these new
 systems/appliances'.
[WEG] that's part of my issue - the only way that you get close enough that 
bootstrapping isn't a problem is when the cache and router are directly 
connected. Otherwise there *is* going to be some amount of time while the 
router is coming up that it can't talk to its configured caches e.g. while it 
learns the route(s) to the cache(s). I think that supports a recommendation to 
put the caches in your IGP instead of BGP, so that you get faster convergence 
of those routes and therefore have access to the cache when BGP comes up and 
starts converging, rather than once BGP is partially converged. But the draft 
doesn't say that.
The question is, does the propagation/convergence delay for an IGP in an 
average network (let's call it somewhere between subsecond and 5 seconds) make 
a non-trival difference in RPKI's bootstrap behavior, especially since BGP 
convergence is also dependent on IGP convergence? Can we make a clearer 
recommendation of the performance envelope we're shooting for so that people 
can design accordingly? I'm not sure I buy a general faster(or closer) is 
always better recommendation - at some point, we hit diminishing returns, 
given that this is mostly a human time-scale system. The document doesn't 
provide clear guidance on how to balance that tradeoff.


 [CLM]
 I guess one way is to say: People should understand the dependencies
 and engineer appropriately ... which you kind of asked to not say in
 the original comment. (or is the issue that the dependencies aren't
 clear?)

[WEG] The issue is that the dependencies aren't clear. I'm not expecting the 
text to be too prescriptive here, because all networks are different, but I 
need enough technical discussion to properly understand the dependencies and 
engineer accordingly. This is an operational considerations document, so it 
needs to tell operators what breaks if they don't do it as recommended. If this 
is about bootstrapping, then we need to be clearer about the relationship 
between bootstrapping and network convergence (since recommending that the 
cache is directly connected to the router is impractical) and how it impacts 
RPKI cache-router communication and performance. If it's about reducing latency 
via proximity, then we need to explain how much latency is too much latency and 
why. If it's about proper geographic diversity within a network's topology, 
then we need to say that. If we don't actually know if it makes a difference, 
and so are defaulting to recommendations that most folks agree are generally a 
good idea, we should say that. But right now we're assuming too much, IMO.

Wes

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [sidr] Last Call: draft-ietf-sidr-origin-ops-21.txt (RPKI-Based Origin Validation Operation) to Best Current Practice

2013-09-24 Thread George, Wes
 From: Randy Bush [mailto:ra...@psg.com]
 i think the two paragraphs you would like to see improved are
[snip]
 i am not against further explanation, send text. but short text.  :)
[WEG] just the first paragraph really, and as I'll note below - I'd love to 
send text, but I don't understand one of the recommendations

 experiments have shown that latency between cache and router, and
 between caches in a cache dag, is not an appreciable issue.
[WEG] ok, so why is close important then?

 i thought bootstrap reachability would be fairly obvious to an operator.
 but if simple routing and no dns dependency were not obvious to you,
 then a few words are indeed needed.  or am i missing your point here?
[WEG] yes, completely obvious. Though the last two sentences of your suggested 
text in the other email is a useful addition


 what is missing from the second paragraph?
[WEG] I'm actually happy with second para


 i am not sure it would be useful to go into the general issue of why
 caches should be proximal to the consumer as it is a rather well-
 explored area, from akamia and limelight to dns.  but if you have a
 sentence or two that communicates this, send it over.
[WEG] Generally, I understand why closer is better for content caches 
(Akamai/llnw) and DNS, but not for RPKI caches. You're making a link between 
the two that I'm not following. Both of the former benefit from proximity 
because it reduces latency and reduces unnecessary backhaul and potentially 
allows for a geographically customized service, resulting in improved user 
experience. If latency isn't a factor (at least in the average-sized 
propagation domain), and RPKI caches aren't particularly bandwidth intensive, 
why does proximity matter? Is this just an extension of the trust domain and 
limited dependence on routing protocols? If so, I'd dispense with recommending 
close because it confuses the issue and just keep the discussion about 
secondary dependencies and trust domains.

Thanks
Wes George


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Last Call: draft-ietf-sidr-origin-ops-21.txt (RPKI-Based Origin Validation Operation) to Best Current Practice

2013-09-23 Thread George, Wes
I've reviewed multiple iterations of this draft, and I believe it is mostly 
ready to go.

However, the concerns I raised during WGLC in 
http://www.ietf.org/mail-archive/web/sidr/current/msg05010.html regarding the 
ambiguity of some of the guidance regarding location of RPKI caches (close) 
in section 3 still have not been addressed. IMO if it is important enough to 
discuss proximity, it is important enough to devote some words to explaining 
the rationale for that recommendation so that operators can make an informed 
design decision.

Thanks,

Wes George



 -Original Message-
 From: ietf-announce-boun...@ietf.org [mailto:ietf-announce-
 boun...@ietf.org] On Behalf Of The IESG
 Sent: Tuesday, September 17, 2013 10:52 AM
 To: IETF-Announce
 Cc: s...@ietf.org
 Subject: Last Call: draft-ietf-sidr-origin-ops-21.txt (RPKI-Based
 Origin Validation Operation) to Best Current Practice


 The IESG has received a request from the Secure Inter-Domain Routing WG
 (sidr) to consider the following document:
 - 'RPKI-Based Origin Validation Operation'
   draft-ietf-sidr-origin-ops-21.txt as Best Current Practice

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2013-10-01. Exceptionally, comments may
 be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


Deployment of RPKI-based BGP origin validation has many operational
considerations.  This document attempts to collect and present those
which are most critical.  It is expected to evolve as RPKI-based
origin validation continues to be deployed and the dynamics are
better understood.





 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-sidr-origin-ops/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-sidr-origin-ops/ballot/


 No IPR declarations have been submitted directly on this I-D.



This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [Int-area] Last Call: draft-ietf-intarea-flow-label-balancing-01.txt (Using the IPv6 Flow Label for Server Load Balancing) to Informational RFC

2013-09-16 Thread George, Wes
I've reviewed this draft, and have one substantive comment:

I think within the operational considerations (and possibly the info model), 
you need some discussion of diagnostics and troubleshooting, both for on-box 
and off-box implementations. How do I see that it's working properly, and how 
do I diagnose problems when it's not?
One of the problems with the existing hashing algorithms is that they are often 
opaque, such that it's not clear what the device is doing, whether the hashing 
is working properly and the flows are of the sort that create imbalanced 
distribution, or whether hashing has broken somehow -- occasionally you can get 
info, but it's usually hidden commands, with difficult-to-interpret responses, 
and it's not like most vendors publish their secret sauce optimizations of 
hashing so that it's easy to predict what will happen given a certain set of 
flows.
In order for this to be operationally manageable, especially in the case of 
on-router processing of this rebalancing, there has to be an easy way for the 
operator to access the information about what's happening - what the result 
would be if the flows were balanced according to the hash vs what is happening 
as a result of rebalancing, so that they can chase down things like rebalancing 
misses or situations where this local optimization is creating a problem 
elsewhere in the path because that device did something different in its 
attempts to balance better, etc. It may also be that this info is necessary to 
properly tune the frequency of sampling, the thresholds for things like 
long-lived vs short-lived flows, etc. to the specific network where it is being 
used.
I realize that in the model you've proposed, we're somewhat limited because 
this is using sampled flow data instead of the realtime packet hash. It may be 
that this drives a requirement for the granularity of data being brought into 
the system in the external mode, and some requirements about the level of 
information available via the UI (or SNMP or XML or whatever) in the automatic 
hardware-based mode.

Thanks
Wes George

 -Original Message-
 From: int-area-boun...@ietf.org [mailto:int-area-boun...@ietf.org] On
 Behalf Of The IESG
 Sent: Monday, September 16, 2013 9:43 AM
 To: IETF-Announce
 Cc: int-a...@ietf.org
 Subject: [Int-area] Last Call: draft-ietf-intarea-flow-label-balancing-
 01.txt (Using the IPv6 Flow Label for Server Load Balancing) to
 Informational RFC


 The IESG has received a request from the Internet Area Working Group WG
 (intarea) to consider the following document:
 - 'Using the IPv6 Flow Label for Server Load Balancing'
   draft-ietf-intarea-flow-label-balancing-01.txt as Informational RFC

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2013-09-30. Exceptionally, comments may
 be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


This document describes how the IPv6 flow label as currently
specified can be used to enhance layer 3/4 load distribution and
balancing for large server farms.




 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-intarea-flow-label-balancing/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-intarea-flow-label-
 balancing/ballot/


 No IPR declarations have been submitted directly on this I-D.

Anything below this line has been added by my company's mail server, I have no 
control over it.
-

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [Int-area] Last Call: draft-ietf-intarea-flow-label-balancing-01.txt (Using the IPv6 Flow Label for Server Load Balancing) to Informational RFC

2013-09-16 Thread George, Wes
Please disregard, these comments are intended for 
draft-ietf-opsawg-large-flow-load-balancing-05. I replied to the wrong thread. 
Sorry for the spam.

Thanks,

Wes


 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 George, Wes
 Sent: Monday, September 16, 2013 11:49 AM
 To: ietf@ietf.org
 Cc: int-a...@ietf.org
 Subject: RE: [Int-area] Last Call: draft-ietf-intarea-flow-label-
 balancing-01.txt (Using the IPv6 Flow Label for Server Load Balancing)
 to Informational RFC

 I've reviewed this draft, and have one substantive comment:

 I think within the operational considerations (and possibly the info
 model), you need some discussion of diagnostics and troubleshooting,
 both for on-box and off-box implementations. How do I see that it's
 working properly, and how do I diagnose problems when it's not?
 One of the problems with the existing hashing algorithms is that they
 are often opaque, such that it's not clear what the device is doing,
 whether the hashing is working properly and the flows are of the sort
 that create imbalanced distribution, or whether hashing has broken
 somehow -- occasionally you can get info, but it's usually hidden
 commands, with difficult-to-interpret responses, and it's not like most
 vendors publish their secret sauce optimizations of hashing so that
 it's easy to predict what will happen given a certain set of flows.
 In order for this to be operationally manageable, especially in the case
 of on-router processing of this rebalancing, there has to be an easy way
 for the operator to access the information about what's happening - what
 the result would be if the flows were balanced according to the hash vs
 what is happening as a result of rebalancing, so that they can chase
 down things like rebalancing misses or situations where this local
 optimization is creating a problem elsewhere in the path because that
 device did something different in its attempts to balance better, etc.
 It may also be that this info is necessary to properly tune the
 frequency of sampling, the thresholds for things like long-lived vs
 short-lived flows, etc. to the specific network where it is being used.
 I realize that in the model you've proposed, we're somewhat limited
 because this is using sampled flow data instead of the realtime packet
 hash. It may be that this drives a requirement for the granularity of
 data being brought into the system in the external mode, and some
 requirements about the level of information available via the UI (or
 SNMP or XML or whatever) in the automatic hardware-based mode.

 Thanks
 Wes George

  -Original Message-
  From: int-area-boun...@ietf.org [mailto:int-area-boun...@ietf.org] On
  Behalf Of The IESG
  Sent: Monday, September 16, 2013 9:43 AM
  To: IETF-Announce
  Cc: int-a...@ietf.org
  Subject: [Int-area] Last Call: draft-ietf-intarea-flow-label-
 balancing-
  01.txt (Using the IPv6 Flow Label for Server Load Balancing) to
  Informational RFC
 
 
  The IESG has received a request from the Internet Area Working Group
 WG
  (intarea) to consider the following document:
  - 'Using the IPv6 Flow Label for Server Load Balancing'
draft-ietf-intarea-flow-label-balancing-01.txt as Informational
 RFC
 
  The IESG plans to make a decision in the next few weeks, and solicits
  final comments on this action. Please send substantive comments to the
  ietf@ietf.org mailing lists by 2013-09-30. Exceptionally, comments may
  be
  sent to i...@ietf.org instead. In either case, please retain the
  beginning of the Subject line to allow automated sorting.
 
  Abstract
 
 
 This document describes how the IPv6 flow label as currently
 specified can be used to enhance layer 3/4 load distribution and
 balancing for large server farms.
 
 
 
 
  The file can be obtained via
  http://datatracker.ietf.org/doc/draft-ietf-intarea-flow-label-
 balancing/
 
  IESG discussion can be tracked via
  http://datatracker.ietf.org/doc/draft-ietf-intarea-flow-label-
  balancing/ballot/
 
 
  No IPR declarations have been submitted directly on this I-D.

 Anything below this line has been added by my company's mail server, I
 have no control over it.
 -

 This E-mail and any of its attachments may contain Time Warner Cable
 proprietary information, which is privileged, confidential, or subject
 to copyright belonging to Time Warner Cable. This E-mail is intended
 solely for the use of the individual or entity to which it is addressed.
 If you are not the intended recipient of this E-mail, you are hereby
 notified that any dissemination, distribution, copying, or action taken
 in relation to the contents of and attachments to this E-mail is
 strictly prohibited and may be unlawful. If you have received this E-
 mail in error, please notify the sender immediately and permanently
 delete the original and any copy of this E-mail and any printout.

This E-mail and any of its attachments may contain Time

RE: [sidr] Last Call: draft-ietf-sidr-bgpsec-threats-06.txt (Threat Model for BGP Path Security) to Informational RFC

2013-09-12 Thread George, Wes
I've reviewed this document and have some comments.

First, an apology, because although I'm an active participant in the SIDR WG, 
I'm pretty sure I missed the WGLC on this, so these comments shouldn't 
necessarily be construed as me taking my argument to ietf@ietf because I felt 
that SIDR ignored my concerns.

Now, my actual comments:

Maybe I'm hypersensitive to such in light of recent accusations of national 
actors subverting supposedly secure infrastructure to behave badly, but I find 
it odd that this threats document doesn't discuss the interaction between a 
national actor and the machinery provided by draft-ietf-sidr-ltamgmt. i.e. a 
national actor imposes upon SPs that operate inside their borders to use their 
own Local (and compromised) Trust Anchor to subvert the protections provided by 
RPKI. While this is primarily a concern for origin validation, I view it as 
distinct from the existing discussion of attacks on a CA covered in 4.5, and 
there is no equivalent Origin Validation threats document. It may be that the 
right path is to augment the discussion of this issue in the LTA management 
draft, and simply reference it from this draft, but I don't think that this is 
discussed suitably in the security considerations of either draft.


Section 4.2 is missing any discussion regarding manipulation of other route 
attributes that may be used to affect a BGP route's selection, such as MED, 
Local Pref. It's covered in section 5, but since this occurred to me whilst 
reading section 4.2, perhaps some mention in 4.2 would be useful, I don't know.
That said, I also think that the discussion of this topic at the end of session 
5 is inadequate for a document in IETF LC. The SIDR WG made a conscious 
decision to secure *only* the AS_Path attribute, and leave other attributes 
insecure, but there is no summary of the underlying rationale supporting this 
choice. Pointing to a WG charter as the sole explanation, and noting that this 
document should be changed if the charter is updated is unacceptable, as it 
provides no context to a reader that was not privy to the discussion leading to 
that charter/scope decision. It also makes reference to something fairly 
ephemeral (a WG and charter) in a permanent document. Fine for a draft in WG 
discussion to have that sort of placeholder, but not anymore. There is a brief 
(and IMO incomplete) discussion of this matter to be found in section 2.3 of 
draft-sriram-bgpsec-design-choices that could be referenced, but since that 
document's future is unclear, some standalone discussion within this document 
might be more appropriate. At a minimum, a threats document should discuss why 
these threats are not considered high enough risk to justify the added 
complexity of securing them using the RPKI.

Thanks,

Wes George


 -Original Message-
 From: sidr-boun...@ietf.org [mailto:sidr-boun...@ietf.org] On Behalf Of
 The IESG
 Sent: Monday, September 09, 2013 6:26 PM
 To: IETF-Announce
 Cc: s...@ietf.org
 Subject: [sidr] Last Call: draft-ietf-sidr-bgpsec-threats-06.txt
 (Threat Model for BGP Path Security) to Informational RFC


 The IESG has received a request from the Secure Inter-Domain Routing WG
 (sidr) to consider the following document:
 - 'Threat Model for BGP Path Security'
   draft-ietf-sidr-bgpsec-threats-06.txt as Informational RFC

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2013-09-23. Exceptionally, comments may
 be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


This document describes a threat model for the context in which
(E)BGP path security mechanisms will be developed.  The threat model
includes an analysis of the RPKI, and focuses on the ability of an AS
to verify the authenticity of the AS path info received in a BGP
update.  We use the term PATHSEC to refer to any BGP path security
technology that makes use of the RPKI.  PATHSEC will secure BGP
[RFC4271], consistent with the inter-AS security focus of the RPKI
[RFC6480].

The document characterizes classes of potential adversaries that are
considered to be threats, and examines classes of attacks that might
be launched against PATHSEC.  It does not revisit attacks against
unprotected BGP, as that topic has already been addressed in
[RFC4271].  It concludes with brief discussion of residual
vulnerabilities.




 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-threats/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-threats/ballot/


 No IPR declarations have been submitted directly on this I-D.

Anything below this line has been added by my company's mail server, I have no 
control over it.
-


This E-mail and any 

RE: Bruce Schneier's Proposal to dedicate November meeting to saving the Internet from the NSA

2013-09-06 Thread George, Wes
+Bruce Schneier (at least the email address published in his latest I-D), since 
he should be at least aware of the discussion his callout has generated.

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Ted Lemon

 On Sep 5, 2013, at 8:46 PM, Lucy Lynch lly...@civil-tongue.net wrote:
  I'd like to share the challenge raised by Bruce Schneier in:

 I thought it was a great call to action.   Is Bruce coming to Vancouver?

[WEG] Sounds to me like he just volunteered to be the keynote for the Tech 
Plenary.

Wes George

Anything below this line has been added by my company's mail server, I have no 
control over it.
-


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Sunday IAOC Overview Session at the Berlin IETF

2013-07-15 Thread George, Wes
 The IETF Administrative Oversight Committee (IAOC) will hold a session
 from 1500-1650 in
 Potsdam 1 at the Berlin IETF on Sunday July 28, 2013.  The purpose is to
 provide an
 overview of the IAOC to allow the community to better understand what
 the IAOC does, how
 the finances work, venue selection, and provide the IAOC feedback on the
 job they are
 doing.

[WEG] After Orlando, there was feedback from multiple folks (myself included) 
requesting that this session *NOT* be scheduled opposite the Newcomers' meet 
and greet, since that means that most of the folks who might want to see this 
but have leadership/mentorship duties must leave the session early. Could this 
be moved to the earlier time slot? If not, can you at least do the content in 
the reverse order from the Orlando session so that between the two, those who 
have to leave after an hour have a mostly complete view between this session 
and the previous one?

Thanks,

Wes


Anything below this line has been added by my company’s mail server, I have no 
control over it.
-

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Regarding call Chinese names

2013-07-11 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Melinda Shore

 I agree
 that this is probably not appropriate for publication as an RFC
 but it would certainly be useful to find someplace for it in the
 wiki.  The chairs wiki might be an option but I think it's of
 broader interest and use.

 Melinda

[WEG] I think writing language documentation isn't really a good use of IETF 
resources, even at an individual level, because neither the problem nor the 
knowledge necessary to address it is specific to the IETF, nor is the problem 
limited to Mandarin participants. As others have noted, this is just one of 
many languages represented by IETFers that we'd have to treat similarly.
Further, an I-D is not a particularly useful format in which to present the 
info. Raw text in the form of $phoneme as in $English_word may not always be 
helpful, especially to nonnative English speakers who now have to work through 
two layers of pronunciation.  Being able to click on a button to hear sample 
pronunciations, especially in the case of words where tones matter, is very 
helpful.

So if pronunciation guides end up in the Wiki or the Tao or some other yet to 
be written Diversity and Cultural guide hosted within IETF, I think it's more 
useful to simply reference things already extant instead of generating our own. 
Those representing the language in question could certainly help us to source 
and vet the information, but that's much quicker and more efficient than 
writing it themselves.
Protocol reuse, hurray! :-)
e.g.
http://mandarin.about.com/od/pronunciation/a/How-To-Pronounce-Mandarin-Chinese.htm
http://en.wikibooks.org/wiki/Japanese/Pronunciation
http://en.wikipedia.org/wiki/Swedish_phonology

To be clear, I'm not saying that this doesn't expose a real problem, and the 
draft certainly drew attention to it, but I also don't think that more 
documentation will solve it, especially since the information is already 
readily available in more accessible formats. I think what you'll find is that 
there are two types of folks (in IETF and generally) - those who see an attempt 
at proper pronunciation and cultural awareness as important and worth making 
extra effort to learn proactively, and those who believe that if it's an issue, 
the person on the receiving end will correct them when they get it wrong (and 
hopefully not repeat the mistake).
Not making a value judgment on either, merely an observation.

Thanks
Wes George

PS: guess which one is my given name and which my surname? Even native English 
speakers aren't immune from name confusion. :-)


Anything below this line has been added by my company's mail server, I have no 
control over it.
-

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Last Call: draft-ietf-opsec-ipv6-implications-on-ipv4-nets-03.txt (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-01 Thread George, Wes
Since I was the one that provided some of this text and raised the issues it's 
addressing, I'll take a crack  at responding at a couple of your concerns below.

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 SM

'Upstream filtering of transition technologies or situations
 where a mis-configured node attempts to provide native IPv6
 service on a given network without proper upstream IPv6 connectivity
 may result in hosts attempting to reach remote nodes via IPv6, and
 depending on the absence or presence and specific implementation
 details of Happy Eyeballs [RFC6555], there might be a non-trivial
 timeout period before the host falls back to IPv4 [Huston2010a]
[Huston2012].'

 I don't see what Happy Eyeballs has to do with operational security.
[WEG] It doesn't. This is a second-order effect, but IMO an important one. If 
one is attempting to prevent IPv6 from being used on a network in an effort to 
secure it from IPv6-related vulnerabilities, one must consider the fact that 
there are multiple IPv6 transition technologies specifically designed to enable 
IPv6 access on a network that is otherwise without IPv6 connectivity, some that 
can be used without any coordination from the upstream network admins. It might 
even helpfully try to share its IPv6 service with other hosts on the network 
(rogue RAs...). The act of preventing those transition technologies from 
passing traffic (by doing things like blocking protocol 41, for example) may 
create IPv6 connectivity that is broken or otherwise impaired, where an end 
host believes that it has IPv6 connectivity via a transition technology when it 
fact it does not because its transition mechanism is being blocked upstream. 
Happy Eyeballs attempts to fix this by ensuring that fallbacks to IPv4 happen 
more rapidly and IPv4 is preferred when issues are detected with IPv6 
connectivity. However, it's inappropriate to rely on pervasive implementation 
of Happy Eyeballs as the sole solution to prevent end host impacts, since the 
end user may not know that IPv6 is actively being disabled on this network, or 
that their IPv6 implementation is otherwise broken. This is a problem that 
continues to get worse the more dual-stack content becomes available.

For this reason, networks attempting to prevent IPv6 traffic from
 traversing their devices should consider configuring their local
 recursive DNS servers to respond to queries for  DNS records
 with
 a DNS RCODE of 3 (NXDOMAIN) [RFC1035] or to silently ignore such
 queries, and should even consider filtering  records at the
 network ingress point to prevent the internal hosts from attempting
 their own DNS resolution.

 The above breaks DNS in an attempt to remove everything IPv6 related
 from the network.

[WEG] On a network with the stated goal of providing/allowing no IPv6 
connectivity,  records are effectively useless. Preventing hosts from 
receiving  records in order to prevent them from attempting to connect to 
an IPv6 address and failing is not broken DNS.

Regards,

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Martians

2013-03-13 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Spencer Dawkins

 At least some of the nerdier nerds were probably thinking how could *I*
 become a Martian? because that would be so cool! ...


[WEG] followed immediately by a complaint thread on this list asking why IAOC 
hasn't yet found a suitable meeting venue on Mars to encourage better 
participation in the IETF by Martians.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Nomcom Reports

2013-03-05 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Mary Barnes

 I have a general question for the community as to whether they find such
 reports useful and whether we should encourage future nomcom chairs to
 produce these?  While this is not listed as a requirement in RFC 3777...

[WEG] Yes, and Yes. However, looking at this as an outsider based just on your 
report and the thread that caused you to send this email, we have a larger 
fault, in that it appears that no one in I* is taking ownership of the problems 
identified. We'd be in a bit less of a crisis mode right now if someone had 
gotten out ahead of this problem, which says to me that we may need an update 
to 3777 to require both this report *and* a formal response by I* orgs to any 
issues identified in said report, even if it is just to take this to the 
community for discussion and suggestions when the problem is identified, rather 
than after we've already tripped over it.

Thanks for sending this out

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Difficulty finding ADs (was: Appointment of a Transport Area Director)

2013-03-05 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Benoit Claise

 Recently, for a single draft, I spent hoouuurrr trying to track all
 the open issues from the directorates and the IESG, and chasing the
 authors.
[WEG] While I realize that Benoit was originally speaking to the need for 
subject matter expertise, this comment also says to me that we are not doing a 
good enough job providing the tools that IESG needs to be as efficient as 
possible with their time, which when combined with the increased volume of work 
in IETF is leading to the borderline unsupportable time commitment. I therefore 
echo the suggestion that IESG should be charged with identifying actionable 
ways to make their jobs easier. I suggest that they set up a meeting, perhaps a 
half or full day with the full IESG, but also at least part of the day should 
be open to any interested former IESG members, plus perhaps secretariat, RSE, 
and tools team representatives. This group would discuss what improvements to 
process, workflow and tools are needed to make the IESG job easier by 
offloading some of the administrative overhead. The end result of that would be 
an internet-draft to track the suggestions and give the community an 
opportunity to provide additional suggestions and get some consensus behind it 
before some or all of the suggestions are put into motion.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Internet Draft Final Submission Cut-Off Today

2013-02-27 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Scott Kitterman
 Sent: Tuesday, February 26, 2013 10:42 PM
 To: ietf@ietf.org
 Subject: Re: Internet Draft Final Submission Cut-Off Today

 How does that relate to working groups that aren't meeting?

[WEG] Signal to noise ratio. I (and I assume others) use the IETF's RSS feed to 
see all new drafts when they are posted. This is in order to have a fighting 
chance to see drafts I might care about that happen in WGs that I am not an 
active participant in, both to help me see if there are other WG lists I need 
to subscribe to or if there are meetings I should attend as a tourist, or 
direct feedback to the authors prior to IETF LC.
New drafts posted for WGs that aren't meeting (and while I'm at it, throwaway 
placeholder -00 drafts with no content) help contribute to the crush of drafts 
to sift through, because it's not readily apparent based on the RSS summary or 
the draft itself whether the WG is meeting. Add me as one more +1 in support of 
a quiet period to give me a chance to catch up on draft review before the 
meeting.

 It was silly I had to rush to post a draft on Monday for a WG that's not
 meeting.


[WEG] Yes it was silly you had to rush, because if the WG isn't meeting, 
there's no reason why you couldn't have simply waited until after the 
moratorium elapsed, or posted it well prior to the inevitable rush of work that 
precedes every meeting.
Though alternatively it should be possible to have the system continue 
accepting submissions and only make them public at the expiration of the 
posting moratorium.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Fwd: I-D Action: draft-barnes-healthy-food-06.txt

2013-02-26 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of SM

 In Section 5:

For cases of first time attendees for a specific location, relevant
 information can be gathered from attendees that have previously
 visited the city.

 There are recurrent discussions as nobody volunteered to gather that
 information in one place.

[WEG] Perhaps a model similar to RFC 6640 would be appropriate - having this 
draft explicitly recommend use of a wiki or other semi-permanent method to 
store and share information collaboratively about specific locations' 
healthy/restricted diet options based on past experience. It could probably be 
a persistent subsection of the IETF meeting wiki, or it could just as easily be 
a pointer to a non-IETF-specific external website that is set up with precisely 
this goal (helping travelers with special dietary needs meet their requirements 
in strange cities) in mind.

Wes George


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: presenting vs discussion in WG meetings (was re:Remote Participation Services)

2013-02-15 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Dave Crocker
 Sent: Tuesday, February 12, 2013 12:06 PM
 To: ietf@ietf.org
 Subject: Re: Remote Participation Services


[WEG] changed subject line to reflect actual topic


 If a meeting has good structure, management and content, the presence or
 absence of slides doesn't matter.


[WEG] Perhaps it would be helpful to make an informal recommendation to WG 
chairs (via the wiki, for example) that generally they should carve each 
request for agenda time roughly in half, with a hard limit of $speaker_time/2 
devoted to presenting or otherwise framing the discussion and the remaining 
time devoted to open mic discussion. Likely this will result in presenters 
asking for 2x their previous time, but at least it will be a more realistic 
method to plan out time during a meeting and reduce the instances where the WG 
will be running short of time for meaningful discussion if the presenter (or WG 
chair) isn't good at managing the available time and spends the whole 
allocation reading slides to the people in attendance.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: A mailing list protocol

2012-12-04 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 S Moonesamy

   (b) replies to messages which use an odd quoting style [2].

 2. http://home.in.tum.de/~jain/software/outlook-quotefix/

[WEG] The referenced program doesn't work for anything 2007 or later (aka 
versions still supported by MS), making it of limited use.

Is there an IETF standard format for handling inline quote replies? Is it just 
not implemented in certain mail clients? If there isn't a relevant standard, 
then we have no business whining that people are doing it wrong, and we 
should probably get to work defining one, either for use on the client side, or 
possibly an extension for common mailman software to parse and fix it on the 
server side to compensate for odd client implementations.

The last thread that talked about how to do email correctly focused on the 
usual bashing of those using outlook or company email addresses, rather than 
much in the way of helpful advice on how to make it less bad.
[ 
https://www.ietf.org/ibin/c5i?mid=6rid=49gid=0k1=933k2=64911tid=1354657596 
]

Browbeating people into changing mail clients will be less than effective, but 
something that systematically makes it easier to see who is responsible for 
what comment in a multi-person thread regardless of source email client would 
be welcome. While we're at it, we could maybe implement a fix for the common 
problem of mangled subject lines that make it very difficult to sort by thread, 
and add a server-side filter that removes the legal bilgewater automatically 
added to some outgoing messages (example will follow in this very message) 
before sending it to the rest of the list recipients, etc.

I'd support a draft of that nature, but rehashing an old draft about nettiquete 
101 is less helpful. A simple reference to the original in the Tao webpage 
would probably be sufficient to get the behavioral point across, and then we 
can focus more on the technical problem that we appear to have.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Useful slide tex (was - Re: English spoken here)

2012-12-03 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Melinda Shore
 it's kind of weird that we cut off discussion so that we can proceed to the
 next presentation.  It's done all the time (I've done it, myself) and
 while there's definitely a sense that we need to cover the material
 we've said we're going to cover in a meeting, why does breadth take
 priority over depth?


[WEG] I think this requires making a judgment call between a ratholed 
discussion, or an impasse between two strongly held opinions vs. meaningful 
progress. Sometimes the former and the latter masquerade as each other and are 
therefore mishandled.

Again, comes down to how the meeting is structured - do you prioritize a set of 
current drafts that need to have meaningful discussion, and accept the fact 
that presentations on new work might lose their timeslots if discussion runs 
long? I think that's an acceptable risk, especially since anyone who is 
technically on the agenda can build a presentation and have it be in the 
proceedings so that people can review after the meeting. I know I had more than 
one meeting where there were many valuable presentations, and a large number of 
them were added to the agenda with zero minutes allocated, so that they'd be 
ready if we had time to discuss them during the meeting once the priority 
discussions were completed, but also so they'd be in the proceedings when we 
didn't.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Useful slide tex (was - Re: English spoken here)

2012-12-03 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Keith Moore
  A different toolset, (e.g. pens and paper
 and overhead cameras coupled to projectors), would likely produce better
 results if that toolset did not encourage laziness in preparing
 materials to facilitate discussion.

[WEG] I don't know about anyone else here, but you do *not* want me to attempt 
to facilitate a discussion using freehand drawings and writing. My handwriting 
and drawing skill was bad before I discovered a keyboard, and years of atrophy 
have made its usefulness approach zero as a meaningful method of communication. 
You'd be better off with the aforementioned stone tablets and cuneiform in 
terms of understanding.

http://theoatmeal.com/blog/handwriting

And I echo what Dave said - quit blaming the tools and assuming that forcing 
people to use tools they're not used to using will fix this. You have a very 
specific opinion of what an effective WG session should be like and what people 
should and should not be doing to facilitate such. Sounds like you need to work 
with the EDU team to give a Sunday afternoon training session entitled how not 
to turn a WG session into a broadcast-only medium possibly with a section for 
WG chairs and a section for potential speakers.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Useful slide tex (was - Re: English spoken here)

2012-12-03 Thread George, Wes
 From: Keith Moore [mailto:mo...@network-heretics.com]

 Years ago, my impression was that that Sunday training sessions were
 pretty much ignored by anyone experienced in the organization.  Is this
 still the case?

[WEG] Depends on the subject matter. If they're all targeted at new attendees, 
it follows that no experienced attendees would be interested. At 5 years in, I 
guess you could call me experienced in the organization, and I attended one 
during IETF84 about crypto and security.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: When to adopt a draft as a WG doc (was RE: IETF work is done on the mailing lists)

2012-11-30 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Melinda Shore

 I'm not very clear on what problem you're trying to solve, or why it's a
 problem.  I've seen some stuff around working group draft adoption that
 I don't like very much but am not sure that I'd identify those as a
 problem, per se, or that they would be done better with yet another
 process document.
[WEG] My original message simply notes that this is the 3rd or more time in my 
recent memory that there has been a serious question within some part of the 
IETF about when in a document's lifecycle and maturity is the right time to 
adopt it as a WG document, and whether it is appropriate to discuss an 
individual document in a WG at any length without adopting it. It seemed odd to 
me that there would be this much confusion on the matter, and I provided 
several examples of different philosophies that I have observed when it comes 
to handling this question. The response I got back indicated that WG adoption 
of drafts isn't really a thing as far as the official documentation of 
document lifecycle is concerned, which made me wonder if perhaps we do as much 
WG adoption of drafts as we do mainly out of inertia, either people doing it 
because that's how they've seen others do it in the past, or doing it because 
they assume it's part of the documented process, rather than for any real 
reason. I'm not a big fan of doing things for no reason, so the ensuing 
discussion was intended to tease this out a bit to see whether we should have 
some clearer guidelines around WG draft adoption, better education on the 
reasoning behind it, or whether maybe we should stop doing it. Is it the 
largest problem facing the IETF? Not by a long shot. But it seemed worth a 
little discussion, at least to me.

 Process we just don't happen to like is not a problem.

[WEG] process we don't happen to like because it adds no value or confuses 
people or wastes time is very much a problem. But I didn't bring this up 
because I didn't like the process, I brought it up because I was seeking a 
little clarity on the underlying reasons we use the process (at least partially 
to improve my own knowledge as a WG chair and draft author). Thus far that 
clarity has still not presented itself.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: When to adopt a draft as a WG doc (was RE: IETF work is done on the mailing lists)

2012-11-29 Thread George, Wes
 From: barryle...@gmail.com [mailto:barryle...@gmail.com] On Behalf Of
 Barry Leiba

 There is no formal process that involves adopting anything.  Working
 group chairs appoint document editors (this is in RFC 2418, Section
 6.3).  There is nothing anywhere that specifies how the first version of
 a WG document is formed.
[WEG] snip
 We seem to have settled into
 a culture of starting with individual submissions and adopting
 them, but there's nothing that requires that

[WEG] What this says to me is that we are adhering to an ad hoc or de facto 
process, and therefore in most cases we're not really thinking about why we do 
it, or even if we should, we're just going with the flow of past precedent. 
AKA, that's the way we've always done it/that's just the way we do things 
around here. We wouldn't do that with a technical protocol that we defined, 
we'd update the standard to reflect reality as implemented. So why are we 
behaving differently with our internal protocol?
If it works and people like it, let's document it so that it can be applied 
consistently. If people think it's unnecessary and we should stick to the 
documentation as written (no adoption), let's do that. If we actively *don't* 
want an IETF-wide procedure here, we can even document that the process for WG 
adoption of drafts is WG-specific and could document those specifics in a WG 
policies wiki document maintained by the chairs. There are plenty of WGs that 
have specific ways that they like to handle document submission, reviews, and 
requests for agenda time. It might be useful to have that all in one place so 
that people can know what's expected of them.

 So, yes, the chairs get to decide how they want to seed the document
 development process, and they have a pretty free hand in making that
 decision.  Your ADs are always there for further guidance if you need or
 want it.  But there's no formal process for that, and I think that's how
 we want it to be.
[WEG] Barry, I respectfully disagree. The whole point I'm making here (and 
Geoff underscored nicely) is that it's currently too variable and too reliant 
on a small group of individual volunteers implementing it correctly. When 
things are not documented, we are dependent on having leadership who innately 
know how to do the right thing. But that leadership turns over fairly 
frequently. so assuming that we'll always have people in leadership who know 
how to make this process work correctly without some guidance is pretty 
risky, IMO. As the IETF ages and grows, and personnel (participants and 
leaders) turn over, the oral tradition breaks down in a hurry. Further, no 
matter how good the individuals are at their jobs within the IETF, applying 
undocumented policy (especially doing it inconsistently) looks to the outside 
world as arbitrary and capricious, or as centralizing authority, and that's not 
at all productive in an open standards development process. It can be 
discouraging to new participants, because it contributes to the overwhelming 
nature of figuring out how to get started as a new document author, and it can 
make the process seem more closed than it actually is.

It is quite possible to document a policy or procedure with directional 
guidance and enough flexibility to allow intelligent adults to think for 
themselves and adapt to the reality of the situation during implementation. I'm 
willing to work on an update to 2418 to cover this apparent gap, but I'd like 
to know whether others agree that this is a problem (and are willing to work on 
the update with me).

Wes George


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: When to adopt a draft as a WG doc (was RE: IETF work is done on the mailing lists)

2012-11-29 Thread George, Wes
 From: barryle...@gmail.com [mailto:barryle...@gmail.com] On Behalf Of
 Barry Leiba

 we have a
 million things that are unspecified and should be unspecified and left
 to management choice.  Trying to find all of those and explicitly say so
 will be a frustrating exercise, and one that won't have a lot of value
 in the end.  In general, we specify what we want to specify, and what's
 left is up to judgment and management.
[WEG] I'm sorry if it was unclear, but I am not saying that *everything* must 
be specified, nor do I think anyone should undertake an effort to even identify 
all of the things that are currently unspecified. I'm pointing out a specific 
area of confusion and inconsistency that has been created by something that is 
unspecified and asking should we specify?

  Further, no matter how good the individuals are at their jobs within
  the IETF, applying undocumented policy (especially doing it
  inconsistently) looks to the outside world as arbitrary and capricious

 Here's where we have a gap, you and I: what you call undocumented policy
 I call a management choice.
[WEG] that's not really a gap, especially because you can replace my words with 
yours and the statement above still holds. I am saying is that there is an 
inconsistency because different people are making different choices on how to 
proceed, hopefully with the consensus of the WG behind them. IMO, the 
inconsistency goes beyond merely being flexible to accommodate the widest 
variety of cases, and adds confusion and variability to the process. I think 
the gap arises from the fact that you do not see this as inconsistent or that 
you do not see the inconsistency as a bad thing. It may not be bad in all 
cases, but I think there's a middle ground between overcreation and 
overapplication of rules and relative anarchy. I'm just trying to make sure 
we're actually in that happy medium, and that this is indeed the result of a 
conscious decision rather than simply imitating what we see in other WGs 
because that seems to work. FWIW, the WG Chairs wiki is also silent on this 
matter, and perhaps that is the best place to add a discussion about WG 
adoption of I-Ds. Is that more palatable?


 We hire the best and the brightest as our working group chairs in order
 to rely on their judgment and management abilities,

[WEG] Well, no disrespect to any current or former AD, but this is giving us 
entirely too much credit for why the vast majority of our WG chairs are good at 
their jobs when it's more likely attributable to luck. Unlike other leadership 
positions in IETF, there's no formal interview or hiring process to determine 
who out of the group of engineers that make up IETF is best qualified to start 
chairing a WG. I certainly had no specific experience that made me any better 
than anyone else at being a WG chair the first time around. My qualifications 
included a non-zero amount of common sense, available cycles, interest in the 
topic, and joking the poor sense not to decline when asked to serve 
/joking. There's no mandatory training class. If one is lucky, you get paired 
with an experienced co-chair (I did) and given a pointer to the wiki (I didn't) 
to help you learn on the fly. It's clear that we trust our WG chairs, and 
there's nothing wrong with that. But sometimes providing them with more 
guidance is helpful.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


When to adopt a draft as a WG doc (was RE: IETF work is done on the mailing lists)

2012-11-28 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 John Leslie

 I'm increasingly seeing a paradigm where the review happens
 _before_ adoption as a WG draft. After adoption, there's a great lull
 until the deadline for the next IETF week. There tend to be a few,
 seemingly minor, edits for a version to be discussed. The meeting time
 is taken up listing changes, most of which get no discussion. Lather,
 rinse, repeat...

[WEG] I've seen several discussions recently across WG lists, WG chairs list, 
etc about this specific topic, and it's leading me to believe that we do not 
have adequate guidance for either WG chairs or participants on when it is 
generally appropriate to adopt a draft as a WG document. I see 3 basic variants 
just among the WGs that I'm actively involved in:
1) adopt early because the draft is talking about a subject the WG wants to 
work on (may or may not be an official charter milestone), and then refine a 
relatively rough draft through several I-D-ietf-[wg]-* revisions before WGLC
2) adopt after several revisions of I-D-[person]-[wg]-* because there has been 
enough discussion to make the chairs believe that the WG has interest or the 
draft has evolved into something the WG sees as useful/in charter; Then there 
are only minor tweaks in the draft up until WGLC (the above model)
3) don't adopt the draft until some defined criteria are met (e.g. 
interoperable implementations), meaning that much of the real work gets done in 
the individual version

It seems to me that these variants are dependent on the people in the WG, the 
workload of the group, the chairs, past precedent, AD preferences, etc. It 
makes it difficult on both draft editors and those seeking to follow the 
discussion for there to be such a disparity from WG to WG on when to adopt 
drafts. I'm not convinced that there is a one-size-fits-all solution here, but 
it might be nice to coalesce a little from where we are today.
So I wonder if perhaps we need clearer guidance on what the process is actually 
supposed to look like and why. If someone can point to a document that gives 
guidance here, then perhaps we all need to be more conscientious about ensuring 
that the WGs we participate in are following the available guidance on the 
matter.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [lisp] Last Call: draft-ietf-lisp-eid-block-03.txt (LISP EID Block) to Informational RFC

2012-11-21 Thread George, Wes


 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Noel Chiappa
 Sent: Wednesday, November 21, 2012 8:49 AM
 To: ietf@ietf.org; l...@ietf.org
 Cc: j...@mercury.lcs.mit.edu; jcur...@arin.net; pwil...@apnic.net;
 i...@ietf.org
 Subject: Re: [lisp] Last Call: draft-ietf-lisp-eid-block-03.txt (LISP
 EID Block) to Informational RFC

 The concept, as I understand it, is that there will be no migration out
 of [that] allocation, for the simple reason that the entire rationale
 of this range of namespace is that it will be processed differently,
 i.e. require special casing in the code in various places; something
 like:

   if ((dest  EIDSPACEMASK) == EIDSPACEALLOCATION)
   process_one_way();
 else
   process_another_way();

 That being the case, the last thing one would want is either i) changing
 the block that is handled specially, or ii) having a number of smaller
 blocks, allocated over time, as either one would require much more
 complex code to
 handle: you'd have to have some sort of config file, which could hold
 multiple blocks, code to read it, the code to process packets (above)
 would have to be able to handle multiple blocks, yadda-yadda.

 (Changing the block is the same as having multiple blocks, because past
 a certain point you're too big for a flag day, which would be the only
 way to avoid having multiple blocks in use at the same time.)

[WEG] Then the draft needs to say some variant of the above - why it can't 
migrate, why a flag day won't work, and why it needs that size block right now 
for an experimental technology, including some justification about the size of 
the block. If the allocation justification is not going to be done within the 
RIR community, then it needs to be done here. Noel, you specifically complained 
about IETF not allowing experiments to proceed while some details are still a 
little hand-wavey [1], but you seem to want it both ways. If this is to be 
permanent space, then permanent justification and level of detail is required. 
If it's to be an experiment, then it should expect that there will be at least 
one renumber as it transitions from experiment to production. I don't think 
that expecting code to handle two blocks (the experimental one and the 
permanent one) is asking too much, nor is it expecting too much to require a 
line in the sand to ensure that the transition between experiment and 
production happens before you're too big for a flag day.
If a single permanent allocation that never changes is truly necessary, putting 
a sunset date on the allocation from IANA seems a reasonable solution to me, 
but no one really responded to that in my last mail [2]. If the experiment is 
wildly successful and leads to a permanent deployment, then the currently 
experimental RFCs get updates written to elevate them to proposed standard, and 
while we're at it, we remove the sunset date from the IANA allocation. If the 
experiment ends up being a science project and doesn't gain wide deployment, 
this reclaims the space to prevent it from being another Class E space that 
is essentially stranded by an allocation that is no longer used.

 I suspect (I haven't communicated with them directly) that the people
 who are involved with this scheme don't really care _who_ allocates the
 space, and how
 - all they care about is that it's all in one chunk - for the reason
 laid out above.

[WEG] and the people who are involved in number allocation have clearly told 
the people involved in this scheme that they do care who allocates the space 
and how, especially if the experiment has no bounded end. I think a compromise 
is doable, but saying it's not important right now probably isn't going to 
make the problem go away.


Thanks,
Wes George

[1] http://www.ietf.org/mail-archive/web/ietf/current/msg75920.html
[2] http://www.ietf.org/mail-archive/web/ietf/current/msg75919.html


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [lisp] Last Call: draft-ietf-lisp-eid-block-03.txt (LISP EID Block) to Informational RFC

2012-11-21 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Noel Chiappa

  If a single permanent allocation that never changes is truly
 necessary

 Allocation != reservation. Nobody is asking for the entire chunk to be
 _allocated_ (i.e. given out), just that it be _reserved_ for this use.


[WEG] You're hairsplitting on semantics in a way that is mostly unhelpful to 
the discussion at hand. Reserving the block for LISP means that it cannot be 
used for anything else. Whether that's an IANA reservation or an RIR allocation 
is really immaterial to the point I was making, which is that if you truly 
believe we have to identify a block once and for all for LISP that is the 
correct size to be used permanently and indefinitely, you need a better 
justification than you've given, and using experimental as a justification 
for not having the details worked out isn't going to be acceptable.

Regards,

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: [lisp] Last Call: draft-ietf-lisp-eid-block-03.txt (LISP EID Block) to Informational RFC

2012-11-16 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Brian E Carpenter

  *please*please*please* study what happened to 6to4 and the
  2002::/16 prefix before continuing this discussion.

 The problem there was that the design of 6to4 assumed, and relied on,
 altruistic cooperation between operators, to ensure that there was a
 useable route to 2002::/16 *everywhere* in the
 IPv6 network. That assumption was naive and led to black holes.

[WEG] The other problem with 6to4 is that by the time we tried to shut it down 
because we determined that it wasn't working acceptably and/or had fatal flaws 
in its design, there was a small (but extremely vocal) group of people who 
basically said you can have 6to4 back when you pry it from my cold, dead 
fingers!! -- perhaps we can kill two birds with one stone if you can convince 
those same people to let you repurpose the 2002::/16 space for LISP?

*ducks* :-)

More seriously:

I echo the concerns that others have raised about the questionable 
justification for a /12 or /16, the limited details around how allocation and 
management might work, and the recommendation to go talk to the RIRs and learn 
how address allocation might work so that you can give them helpful 
recommendations when (and if) it comes time to write RIR policy to manage this 
space. I'd rather this not be deferred to a later document, because there is 
little incentive to complete such a document once the allocation is already 
made. Either you know how this will be used and can articulate it, or you 
don't. If you don't, you aren't ready to request it.

Additionally: The LISP documents are classified as experimental (though this 
one is not...). Therefore I see two possible solutions that don't appear to 
have been discussed yet:
1) the RIRs have existing policy regarding experiments (e.g. 
https://www.arin.net/policy/nrpm.html#eleven ). You might consider looking at 
those policies to see if getting a direct allocation from one or more RIRs for 
your experiment would be a workable solution, rather than locking space into 
this via IANA.
2) Request the space (with improvements to the request as stated above and 
elsewhere in this thread) but include a sunset date for the allocation from 
IANA. If the experiment is successful, the expectation is that you will write 
proposed standard drafts refine the implementation and to make it not 
experimental, and you can make the IANA allocation permanent at the same time. 
If the experiment is not successful and this space is no longer needed in a few 
years, we don't have to fight a small vocal minority to shut it down. (c.f. 
RFC3701). While I'm *less* worried about us wasting IPv6 space, it's not 
infinite, and I'm having visions of the IPv4 Class E space, where we have this 
sizable chunk of addresses allocated for a special purpose that 10 years from 
now could (and should) be used for something else, and inertia means that they 
never do, filed under it seemed like a good idea at the time...

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


in-person vs remote participation (was: Newcomers [Was: Evolutionizing the IETF])

2012-11-12 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Hector Santos

 The IETF should be leading the charge for easy to use, multi-device
 readiness cyberspacing virtual meeting places, including better
 electronic groupware collaboration tools, etc. It is undoubtedly and
 inevitably the Achilles' Heel for the IETF Meeting.  So the IETF needs
 to embrace it now, big time, before its too late. This includes getting
 on board with membership models to subsidize the business and its
 future.  This shouldn't take away Face to Face communications - in
 fact, it will increase it.  Its much more doable with today's higher
 universal bandwidth and the IETF needs to be prime examples of the
 various technology it is helping put together and standardize.  In fact,
 the IETF can probably learn and help improve groupware communications
 with new working groups focusing on groupware.


[WEG] as someone who normally attends meetings in person, and had no choice but 
to participate remotely this time on account of injury, I agree that IETF needs 
to be focused on ways to improve remote participation as a means to reduce the 
barrier to participation that our current travel requirements represent. 
However, this is not only a technology problem. Remote participants suffer from 
a cultural problem that is merely being exacerbated by the technology's 
limitations. It is by no means unique to the IETF, because I've experienced it 
plenty of times while working for companies that have remote offices and 
teleworkers, but we definitely need to acknowledge it and look for solutions to 
it if we're going to be successful with remote participation. Remote 
participants are figuratively (and often literally) invisible, and therefore 
people forget about them, and they get relegated to second-class status as a 
participant. Even if it's only subconsciously, the in-person participants don't 
see remote participants to be as committed to participation as those who gave 
up a week, traveled, paid for hotel, meals, registration, etc. and often the 
lack of a face to go with the name makes a tangible difference in the 
interactions. The only reason that remote participation even sort of works in 
the IETF is that there are enough people who have done it before and know how 
much it can suck when it goes poorly that they make a conscious effort to treat 
remote participants as an equal part of the meeting attendees such that they 
enforce good mic etiquette, volunteer to be jabber scribes, ensure 
presentations are posted, etc. even when the WG chairs fail to do so. While I 
am very grateful for those folks, that's an unreliable mechanism, one that 
failed on numerous occasions in several WGs I tried to participate in this past 
week. I don't post this message to whine, but to note that if we're going to 
get serious about remote participation, it's not all about shiny new tools, but 
instead the mentality of those who still participate in person. There are other 
less tangible issues that I'll address in another message.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


in-person vs remote participation (was: Newcomers [Was: Evolutionizing the IETF])

2012-11-12 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Mikael Abrahamsson

 Personally I believe there could be value in describing what the value
 is to attend the meeting physically. I attended the last meeting in
 Stockholm because it meant I only had to pay the entrence fee, since I
 live there.

 Getting buy-in from management to allow me to go for a week somewhere
 and not be available in the office, pay for hotel and travel, plus the
 entrence fee, it's hard to justify to management. What is a good answer
 to the question why?.

[WEG] I've had to justify my participation in IETF multiple times in the last 
few years, and while official duties as a presenter or WG chair made justifying 
travel easier, prior to that point, I had to try to articulate exactly this. As 
noted in my other message, this was the first remote meeting for a while for 
me, and it put into sharp relief the difference between in-person and remote 
participation. While most folks do indeed attend IETF to attend WG meetings, I 
think that's only part of the story, and you're right, it's something we need 
to do a better job of articulating and considering when we attempt to replicate 
IETF attendance virtually or help new participants feel included.

First and foremost, the act of getting away from the office and the financial 
and time commitments involved in traveling to a physical meeting a few times a 
year tends to reinforce the need to prepare for the meeting by reading 
drafts, catching up on IETF work that has languished, etc. The travel and 
meeting schedule imposes a deadline of sorts, in addition to providing physical 
separation that allows people to reprioritize their work so that for that week 
or so, $dayjob becomes secondary to focusing on what's happening in IETF, since 
everyone traveled all that way and spent all that money to meet together. 
The proximity provides an excuse to get work done, whether in a WG meeting, or 
sitting in the hall collaborating with a co-author in real-time. I don't know 
how you replicate that virtually, especially in the extremes of timezone 
differential. I know for me, life intrudes a lot when I haven't physically 
*left* my normal location and therefore I should be available for the things I 
would normally do when I am home or in the office. Perhaps if we move to a 
virtual-only model, we would be able to spread the work out in smaller chunks 
over more time so that it's more manageable as a portion of your overall 
workload, or perhaps we keep the defined meeting time as a way to ensure 
coordination across many timezones, I don't know.

The other things that become important are the hallway track and the many 
fine lunches and dinners. Those come up when talking about attending IETF in 
person, but often it's meant to imply that those involved are there for the 
wrong reasons (i.e. IETF as company-sponsored tourism or job search) rather 
than to acknowledge its value in ensuring that IETF does make progress by 
forging personal and professional relationships between its participants. There 
is so much networking that happens during those that is mostly lost to remote 
participants, and it really is invaluable. Whether it's trying to work out a 
compromise on a particularly contentious part of a draft, or stumbling across a 
problem or solution in a freewheeling conversation, or just talking shop with 
like-minded folks, I find that this makes IETF a much more rewarding 
experience. I also find that this makes it easier to make progress in WGs when 
limited to low-bandwidth communications channels like email, because you now 
know the other people involved. In person attendance, food and drink provide 
the opportunity, and are the means, rather than the end. But that requires you 
to know people well enough at least professionally that you can take advantage 
of that. I can see that being challenging for those who are newcomers or have 
only met someone virtually. I am quite sure that there are ways to replicate 
those more unofficial/social interactions virtually with the improvements in 
video conferencing and telepresence technology, but I'm not sure it's possible 
to get past the strong psychology that makes doing it over food and drink more 
effective.

The whole meatspace vs cyberspace argument has been going on ever since there 
has been a cyberspace, so I'm not going to act like this is new, but I think 
we're getting to the point now where the technology is catching up with the 
science fiction portrayal such that it's worth having the discussion again.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, 

RE: IESG Considering a Revision to NOTE WELL

2012-11-06 Thread George, Wes
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 IETF Chair

 === Proposed Revised NOTE WELL Text ===

   - You understand that meetings might be recorded, broadcast, and
publicly archived.

[WEG] I might suggest a small tweak (in brackets below) to this part of the 
text given some of the previous discussions around blue sheets/privacy and 
documenting people's participation in IETF potentially against their will:

- You understand that meetings [and therefore your participation in them] might 
be recorded, broadcast, and publicly archived.
I think this makes things a little more explicit in a way that may be helpful 
to those who are less familiar with IETF meetings.

Otherwise, consider this a +1 to comments supporting simplification of the Note 
Well text to make it a more effective summary.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Last Call: draft-ietf-behave-lsn-requirements-07.txt (Common requirements for Carrier Grade NATs (CGNs)) to Best Current Practice

2012-07-09 Thread George, Wes
 From: Simon Perreault [mailto:simon.perrea...@viagenie.ca]
 Sent: Saturday, July 07, 2012 5:21 PM

 Wes,

 Here's my take on this...

 CGN as defined in this document does not only include NAT444. It is more
 generic than that: it really means multi-user NAT. Dave Thaler came up
 with the example use case of the NAT in a wifi hotspot. It's just NAT44,
 but it still fits with the draft's definition of CGN because you have
 multiple users potentially fighting for the same NAT resources. Remember
 that the main raison d'être of this draft is for the operator to be able
 to ensure fairness between NAT users. So in this view I think it is
 clearly behave material since the sunsetting of IPv4 really is
 orthogonal to multi-user NATs.

 On the question of IPv6: I don't think we should talk about IPv6 simply
 because IPv6 NAT so far has not seen significant deployment in the
 context of multi-user NAT. And NPTv6 is stateless so there are no
 resources to fight for.

[WEG] I agree with all of what you've said, but I think I need to make the 
point that I'm concerned with clearer, because the above doesn't exactly 
address it. I wasn't saying anything about IPv6 NAT, or even IPv4 sunset. I was 
saying that the current wording is unclear as to what you mean by IPv4-only. 
While the NAT specified by this document itself may only act on IPv4 traffic, 
as you note above it's not limited to just NAT444 or even an IPv4-only 
*network*. The recommendations in this doc will work for an IPv4 NAT associated 
with DSLite just as easily as a more traditional IPv4 transport. This is an 
important distinction, IMO.


 Back to your email, where you wrote:

  if it is truly a IPv4-only NAT (NAT44 or NAT444) requirements doc
 rather than a more generic CGN requirements doc, it should be named to
 reflect that.

 How about Common Requirements for IPv4 Carrier Grade NATs (CGNs)?
[WEG] This helps, but only in conjunction with additional clarification about 
the application - that is, just because the NAT is IPv4-only doesn't mean that 
the network must also be IPv4-only.

Thanks
Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Last Call: draft-ietf-behave-lsn-requirements-07.txt (Common requirements for Carrier Grade NATs (CGNs)) to Best Current Practice

2012-07-06 Thread George, Wes
I have a comment about this document related to some discussions that I've had 
with a number of ADs and WG chairs around the formation and charter of Sunset4 
to determine what is and is not in scope for that WG.

For a while both BEHAVE and Sunset4 had this document in their milestones, 
which clearly won't work. Therefore the distinction made between work to be 
done in BEHAVE and SUNSET4 was that BEHAVE was to focus more generically on the 
concept of NAT and the things necessary to make all flavors of it work, such 
that BEHAVE outputs would equally apply to NAT444, NAT64, DSLite, etc. By 
contrast, Sunset4 was supposed to focus more narrowly on IPv4-only items. The 
BEHAVE chairs were represented in these discussions, and they believed that 
this document was in keeping with this distinction.
In the document's introduction, for example, that generic nature is implied:
  It is not an IETF endorsement
   of CGN or a real specification for CGN, but rather just a minimal set
   of requirements that will increase the likelihood of applications
   working across CGNs.

However, this document states in section 2:
  Note also that the CGN described in this document is IPv4-only.
   IPv6 address translation is not considered.
I see that this is a new change to the -07 version, so I hate to rehash the 
discussion, but I think that this statement should be clearer.
In reading the document, I don't believe that the intent was to limit it to 
being a discussion of NAT44[4], but that could be the way that this statement 
is interpreted. The distinction I might make to clarify is that since the 
document is talking about behaviors that are necessary to make IPv4 
address-sharing work, it's specific to the IPv4 side of what could well be a 
dual-stack NAT, but it's not limited to simply NAT44[4].

I'm not advocating pulling this document back so that it can go to the right 
working group, because I don't think that'll actually add any value to the 
document and I'm not a fan of process for process's sake. My concern is really 
more about content and naming- if it is truly a IPv4-only NAT (NAT44 or NAT444) 
requirements doc rather than a more generic CGN requirements doc, it should be 
named to reflect that. If it's meant to be a generic LSN requirements doc, the 
authors should make the appropriate changes to keep it generic.

Thanks,

Wes George, at least partially wearing my Sunset4 chair hat



 -Original Message-
 From: ietf-announce-boun...@ietf.org [mailto:ietf-announce-
 boun...@ietf.org] On Behalf Of The IESG
 Sent: Tuesday, June 26, 2012 12:59 PM
 To: IETF-Announce
 Cc: beh...@ietf.org
 Subject: Last Call: draft-ietf-behave-lsn-requirements-07.txt (Common
 requirements for Carrier Grade NATs (CGNs)) to Best Current Practice


 The IESG has received a request from the Behavior Engineering for
 Hindrance Avoidance WG (behave) to consider the following document:
 - 'Common requirements for Carrier Grade NATs (CGNs)'
   draft-ietf-behave-lsn-requirements-07.txt as Best Current Practice

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2012-07-10. Exceptionally, comments may
 be sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


This document defines common requirements for Carrier-Grade NAT
(CGN).  It updates RFC 4787.




 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-behave-lsn-requirements/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-behave-lsn-
 requirements/ballot/


 The following IPR Declarations may be related to this I-D:

http://datatracker.ietf.org/ipr/1648/




This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: IETF attendees reengineer their hotel's Wi-Fi network

2012-03-29 Thread George, Wes
I had recommended separately on the attendees list that perhaps Chelliot and 
his merry band of supernerds need to write an informational or BCP draft, 
accompanied by a round of *NOG presentations to share the wealth, as 
documentation in this area appears a bit sparse -- I've been to plenty of other 
conferences where the wireless network melted down in the hotel, conference 
itself or both. In response, Joel Jaeggli pointed to a NANOG presentation that 
is so old that it's still talking about 802.11G (and A) as a future thing, and 
the network in question was probably dealing with half or less of the devices 
that a modern one must do (no wi-fi phones, tablets, etc). So while the 
fundamentals of dealing with RF frequency overlap and power probably haven't 
changed much, I think that perhaps we're due for an update on the experience of 
managing and optimizing large-scale conference/hotel WiFi networks, especially 
the part about the tools that you use that enable you to re-engineer a network 
of that size on the fly (aside from pure awesome and lack of sleep, that 
is). :-)

Thanks,

Wes


 -Original Message-
 From: Robert Raszuk [mailto:rob...@raszuk.net]
 Sent: Thursday, March 29, 2012 5:44 PM
 To: George, Wes
 Cc: IETF Discussion
 Subject: Fwd: IETF attendees reengineer their hotel's Wi-Fi network

 Hi Wes,

 Could we perhaps add a section to your draft
 (draft-george-travel-faq-05.txt) on how to fix wifi network in the hotel
 you are staying ?

 Pointer to set of open source wifi troubleshooting tools would be
 welcome too ;)

 Cheers,
 R.

  Original Message 
 Subject: IETF attendees reengineer their hotel's Wi-Fi network
 Date: Thu, 29 Mar 2012 17:28:26 -0400
 From: Russ Housley hous...@vigilsec.com
 To: IETF ietf@ietf.org

 Disgusted IETF attendees reengineer their Paris hotel's Wi-Fi network
 What happens when a bunch of IETF super nerds show up in Paris for a
 major conference and discover their hotel's Wi-Fi network has imploded?

 http://newsletters.networkworld.com/t/6464858/258923304/355639/0/




This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: IETF.Fact.Check IETF Participants that were also at ICANN Costa Rica Meeting ?

2012-03-29 Thread George, Wes
Which is why I'm wondering why it took us that long to punt him? Our rules 
shouldn't treat people like this as a first-time poster if it's the same 
nonsense that got them banned before, but from a new email address.

Mr. Fleming had stopped trolling lists for the last 6-9 months, but prior to 
that he was hitting every list he could find plus Twitter (hashtag spamming), 
and it appears that it's about to start again, so I'd ask that the admins be a 
bit more aggressive in this regard.

Thanks
Wes George


 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Yoav
 Nir
 Sent: Thursday, March 29, 2012 6:01 PM
 To: Eric Burger
 Cc: IETF list
 Subject: Re: IETF.Fact.Check IETF Participants that were also at ICANN Costa
 Rica Meeting ?

 Oh, this guy pre-dates RFC 4633

 http://www.google.com/search?q=%22jim%20fleming%22%20site:ietf.org

 On Mar 29, 2012, at 11:48 PM, Eric Burger wrote:

  I was about to say we are at a point for an RFC 4633 action. Thanks.
 
  On Mar 29, 2012, at 2:26 PM, JORDI PALET MARTINEZ wrote:
 
  Hi Jim,
 
  This is my last message to you as IETF Sergeant-at-arms.
 
  I've asked the Secretariat avoid your posts going thru the email exploder.
 
  Regards,
  Jordi



This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Query to the community -- An additional IETF Meeting event?

2012-03-19 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Henk
 Uijterwaal

 We have had cases where the opening reception was sponsored by somebody other
 than the host for the meeting (if there was a host).  The sponsor didn't get
 much more than the possibility to put a sign near the front door and get
 some recognition during one of the plenary sessions.  This proposal
 essentially
 says that the sponsors can demonstrate equipment during the reception.

[WEG] +1
I was one of the people who suggested this to IAOC after recently attending my 
first NANOG in a good while.  While I realize the audiences (and therefore the 
attractiveness to marketing budgets) are different, the sharp contrast between 
the two made it clear that there may be some opportunities to tweak IETF's 
sponsorship methods and potentially reduce the costs attendees are asked to 
bear without turning it into yet another tradeshow or forcing I* members to 
wear auto-racing-style suits emblazoned with vendor logos. :-)
In addition to Beer-n-gear, NANOG had 2 other sponsored (i.e. free to all 
attendees) socials, and enough free T-shirts to last a person a week, plus 3-4 
slides full of sponsor logos. Not that we need any more free t-shirts, but 
compare that to this IETF, where if you want a shirt, you must purchase it 
because we didn't have a primary sponsor until Cisco took pity on us (and 
apparently the shirt cannot be sponsored separately).

That said, I don't think that this potential experiment requires a *separate* 
night. I'd much prefer to replace the  current overpriced hotel cash bar 
arrangement at the welcome reception with something more like beer-n-gear. I'm 
also willing to try it in lieu of a social event, since those are typically hit 
or miss in terms of whether the environment is conducive to socializing, 
whether they're worth the additional money one must pay to attend them, and the 
fact that these are generally limited participation (tickets required), thereby 
reducing the opportunities for group socialization.

 And, having been to such sessions at NANOG and others, I know that you don't
 have to look at the gear brought by the vendors, it is perfectly possible to
 have the beer (for free) and have the hallway discussion you wanted to have
 anyway, while ignoring the demos.
[WEG] This is definitely true. The two are not mutually exclusive.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


RE: Last Call: draft-george-travel-faq-03.txt (IETF meeting attendees' Frequently Asked (travel) Questions) to Informational RFC

2012-02-23 Thread George, Wes
Revision -04 has been posted which I believe addresses all of the comments 
received thus far.

http://tools.ietf.org/html/draft-george-travel-faq-04

Thanks,

Wes George

 -Original Message-
 From: ietf-announce-boun...@ietf.org [mailto:ietf-announce-boun...@ietf.org]
 On Behalf Of The IESG
 Sent: Tuesday, February 07, 2012 5:59 PM
 To: IETF-Announce
 Subject: Last Call: draft-george-travel-faq-03.txt (IETF meeting attendees'
 Frequently Asked (travel) Questions) to Informational RFC


 The IESG has received a request from an individual submitter to consider
 the following document:
 - 'IETF meeting attendees' Frequently Asked (travel) Questions'
   draft-george-travel-faq-03.txt as an Informational RFC

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2012-03-06. Exceptionally, comments may be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


This document attempts to provide a list of the common Frequently
Asked Questions (FAQs) that IETF meeting attendees often ask
regarding travel logistics and local information.  It is intended to
assist those who are willing to provide local information, so that if
they wish to pre-populate answers to some or all of these questions
either in the IETF Wiki or a meeting-specific site, they have a
reasonably complete list of ideas to draw from.  It is not meant as a
list of required information that the host or secretariat needs to
provide, merely as a guideline.




 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-george-travel-faq/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-george-travel-faq/


 No IPR declarations have been submitted directly on this I-D.


 ___
 IETF-Announce mailing list
 ietf-annou...@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf-announce

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-george-travel-faq-03.txt (IETF meeting attendees' Frequently Asked (travel) Questions) to Informational RFC

2012-02-13 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of SM

 In Section 1:

more efficiently than waiting until someone sends an email to the
 xxattend...@ietf.org list in the days leading up to the meeting.

 The XX is ambiguous.
[WEG] Well, it was intended to be generic (a variable to represent multiple 
numbers). Are you saying ambiguous as in this intent is unclear, use a 
different method to represent this generically or you should use a specific 
number as an example, e.g. 83attend...@ietf.org?
Would the meeting-specific attendees email list be better?

 The draft is written from am IETF perspective for an IETF audience.
[WEG] It was written by an IETF person, in the IETF's process for managing 
documents. Within those constraints, it was meant to assume very little about 
what people know about IETF such that it could be useful to a non-IETF 
audience. If there's a point to this comment other than to be snarky, I'm 
missing it.

 Does http://wikitravel.org/en/Paris provide answers to some of the
 questions in this draft?
[WEG] Probably. This draft is not about evaluating sources of information to be 
provided for individual and specific IETF meetings. It is meant to be generic. 
I'd encourage you to post that link to the Paris IETF's wiki.

 but that results in hundreds of people spending their time
 searching, which is not very efficient.

 If hundreds of people spent their time searching, there would have
 been more information on
 http://www.ietf.org/registration/MeetingWiki/wiki/doku.php  Or is it
 not efficient for people to share the information they have found?
[WEG] no one can force those who find an answer to their question (via whatever 
method) to post it to the wiki. The meeting wiki is only as good as its level 
of contribution, and this document isn't making commentary on that problem. 
This is simply noting that lots of attendees need a similar set of information.

no matter how good online translation is getting, some of the most
 informative sites may be difficult for non-native speakers to

 Is this about informative sites being difficult for non-native
 speakers or for people from a specific part of the world?
[WEG] I think this is pretty self-explanatory taken in the context of the 
preceding sentences, but I'll attempt to clarify. When one is attempting to do 
research about a place one is planning to visit, if the site with the best 
information is only available in the local language, and half of the site is 
flash or graphical text buttons, sending it to translate.google is not going to 
translate the text contained in flash or images, which may make the site 
difficult or impossible to use. The source and destination language/region is 
immaterial. This is simply defining a practical matter associated with language 
barriers online.

 I suggest that the author seeks feedback from people who use English as a
 second language.
[WEG] The author has sought and received feedback from the IETF list multiple 
times prior to last call, and again now. One might be forgiven for assuming 
that there are a few nonnative English speakers among the subscribers of said 
list who have read the document. If those who use English as a second language 
have text to provide, he'll gladly accept it. Otherwise, maligning the document 
or its author because it attempts to cover language issues but was written by 
an native English speaker is not particularly productive.

 Visa requirements is a one-liner whereas food considerations are
 discussed in several paragraphs.
[WEG] The main posting on the IETF site regarding the specific meeting includes 
a link to one or more Visa information sites. IETF has been providing links to 
Visa information for years, as it is far more critical to foreign attendance 
than any of the other items discussed in this document. Therefore I didn't 
spend a lot of time on it. The only part of the currently-provided visa 
information that I have seen complaints about is when the combination of the 
source and destination countries' embassies don't play nicely together and 
Visas take too long to be practical. That is a much different problem. However, 
more than one person has commented about the limited text with regards to 
visas, so I'll attempt to bolster the Visa discussion slightly, but suggested 
text is welcome.

 Section 3.3 is labelled
 International considerations.  The entire document is about
 international considerations.
[WEG] After reviewing what is in this section based on your comment, I'd argue 
the other way. Like the rest of the document, a large portion of it is not 
specific to international travel and may vary by region and municipality within 
the same country. I'm open to suggestions as to an alternate heading for 
section 3.3 that is more descriptive than other.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, 

RE: Last Call: draft-weil-shared-transition-space-request-14.txt (IANA Reserved IPv4 Prefix for Shared Address Space) to BCP

2012-01-31 Thread George, Wes
I've been recommending this direction (that this is basically just more private 
space, no magic) for some time, so I support the change.

However, I strongly believe that the document should formally update RFC1918, 
not just 5735, especially now that it specifically says that in certain 
circumstances the space can be used as 1918 space. Having the linkage between 
the documents (from 1918 to this one, instead of just in the other direction) 
is quite important, IMO.

Wes George


 -Original Message-
 From: ietf-announce-boun...@ietf.org [mailto:ietf-announce-boun...@ietf.org]
 On Behalf Of The IESG
 Sent: Monday, January 30, 2012 6:04 PM
 To: IETF-Announce
 Subject: Last Call: draft-weil-shared-transition-space-request-14.txt (IANA
 Reserved IPv4 Prefix for Shared Address Space) to BCP


 The IESG has received a request from an individual submitter to consider the
 following document:
 - 'IANA Reserved IPv4 Prefix for Shared CGN Space'
  draft-weil-shared-transition-space-request-14.txt as a BCP

 On its December 15, 2011 telechat, the IESG reviewed version 10 of this
 document and requested various changes. These changes are reflected in
 the draft version 14 and the IESG now solicits community input on the
 changed text only. Please send substantive comments to the ietf@ietf.org
 mailing lists by 2012-02-16. Exceptionally, comments may be sent to
 i...@ietf.org instead. In either case, please retain the beginning of
 the Subject line to allow automated sorting.

 Abstract

   This document requests the allocation of an IPv4 /10 address block to
   be used as Shared Address Space to accommodate the needs of Carrier
   Grade Network Address Translation (CGN) devices.  It is anticipated
   that Service Providers will use this Shared Address Space to number
   the interfaces that connect CGN devices to Customer Premise Equipment
   (CPE).

   Shared Address Space is distinct from RFC1918 private address space
   because it is intended for use on Service Provider networks.
   However, it may be used as RFC 1918 private address space in certain
   circumstances.  Details are provided in the text of this document.

   As this document proposes the allocation of an additional special-use
   IPv4 address block, it updates RFC 5735.

 The following text captures the most salient change between version 10 and 14
 of this document:

   Shared Address Space is IPv4 address space designated for Service
  Provider use with the purpose of facilitating CGN deployment.  Also,
  Shared Address Space can be used as additional [RFC1918] space when
  at least one of the following conditions is true:

  o  Shared Address Space is not also used on the Service Provider side
 of the CPE.

  o  CPE routers behave correctly when using the same address block on
 both the internal and external interfaces.


 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-weil-shared-transition-space-request/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-weil-shared-transition-space-request/


 No IPR declarations have been submitted directly on this I-D.
 ___
 IETF-Announce mailing list
 ietf-annou...@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf-announce

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-weil-shared-transition-space-request-14.txt (IANA Reserved IPv4 Prefix for Shared Address Space) to BCP

2012-01-31 Thread George, Wes
 From: Noel Chiappa [mailto:j...@mercury.lcs.mit.edu]

 Is that wise? I thought (IIRC, and maybe I'm spacing) the whole reason for
 allocating this space was that 1918 space _couldn't_ easily be used for CGN
 because there were too many conflicting usages.
[WEG] yes, but the general sense I got from the ensuing discussion was that no 
one expects anyone to actually adhere to that advice (ie MUST NOT be used as 
substitute for 1918 space), and as soon as the space is released, it'll be 
cats and dogs living together, mass hysteria... because everyone and their 
cousin will start using it as 1918-bis anyway, no matter whether the IETF wags 
their fingers at them or not.

 So, now we're making more 1918 space? This is a good idea... how? If we need 
 more 1918 space, let's do so
 deliberately, and not kill the usefulness of this space for CGN. (Unless, of
 course...)

[WEG] I think it provides a window of opportunity - get in before the place 
gets busy. Hopefully by the time people have really adopted the space for 
1918-type uses, working IPv4 CGN will be of less relevance... or at least 
that's what I'm telling myself. This just acknowledges what people believe to 
be the case instead of trying to deny that it'll happen.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


draft-george-travel-faq-02

2012-01-10 Thread George, Wes
I've made updates to this document to improve the structure (more subsections 
instead of multiple levels of bullets) as well as to incorporate the great 
feedback on content that I've received from lots of folks. I'm sending it for 
one more round of review and feedback before I move towards publishing.
http://tools.ietf.org/html/draft-george-travel-faq

Unless I receive feedback to the contrary, I'll be pursuing this as an 
Independent Submission.

Thanks
Wes George


-Original Message-
From: internet-dra...@ietf.org [mailto:internet-dra...@ietf.org]
Sent: Tuesday, January 10, 2012 2:25 PM
To: George, Wes
Cc: George, Wes
Subject: New Version Notification for draft-george-travel-faq-02.txt

A new version of I-D, draft-george-travel-faq-02.txt has been successfully 
submitted by Wesley George and posted to the IETF repository.

Filename:draft-george-travel-faq
Revision:02
Title:   IETF meeting attendees#39; Frequently Asked (travel) Questions
Creation date:   2012-01-10
WG ID:   Individual Submission
Number of pages: 11

Abstract:
   This document attempts to provide a list of the common Frequently
   Asked Questions (FAQs) that IETF meeting attendees often ask
   regarding travel logistics and local information.  It is intended to
   assist those who are willing to provide local information, so that if
   they wish to pre-populate answers to some or all of these questions
   either in the IETF Wiki or a meeting-specific site, they have a
   reasonably complete list of ideas to draw from.  It is not meant as a
   list of required information that the host or secretariat needs to
   provide, merely as a guideline.




The IETF Secretariat

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


primary Paris hotel booking

2012-01-03 Thread George, Wes
Happy New Year, it's time for our triannual hotel complaint thread.
I hate to do it, but I think that there are people who haven't looked at this 
yet, and I'm hoping that we can perhaps rectify it before the majority of folks 
try to book:

 Instructions for making reservations at Hotel Concorde:
Please fill out the reservations form and fax it directly to the hotel at: +33 
1 57 00 50 79 or email it to cmas...@concorde-hotels.com

It's 2012, but the IETF and this hotel chain expects us to book reservations at 
the main conference hotel by (international) FAX or by *emailing* a form which 
includes a credit card number so that the hotel can hold the room and implement 
its relatively bizarre prepay/anti-cancellation policy.
Would it be trolling to ask whether anyone verified that cmasson has support 
for PGP encrypted-email and a proper method of securely storing (and then 
destroying after use) the several hundred credit card numbers they are about to 
receive?

What person or rate code should we ask for when booking our rooms over the 
phone? (hey if I'm going old school, I'm doing it all the way!) Though, given 
the above, I'm relatively worried that my credit card number will simply end up 
on an unprotected spreadsheet on a PC somewhere in their office even if I call 
to book.

More practically, the hotel blocks at the primary hotel typically fill up quite 
fast once registration is opened, especially since the overflow hotel is 
actually more expensive than the primary. Does the hotel fax/call us back to 
tell us that they have no more rooms available for our requested dates, or is 
the block open-ended such that they will keep selling rooms in it until the 
cutoff regardless of the number?

Evidently ability to book group rate rooms online is something that should be 
added to our list of hotel requirements. I'm stunned that it's not there 
already.

Wes George



This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-arkko-ipv6-only-experience-04.txt (Experiences from an IPv6-Only Network) to Informational RFC

2011-12-16 Thread George, Wes
I support the work behind this document, but I do have a concern that gives me 
pause regarding publishing it as an RFC in its current form.

I worry that it will serve as a disincentive for people to attempt IPv6-only 
deployments. This is not because of the way that it's written, nor a commentary 
on the quality of the document itself. I think that it does a good job of 
noting that it is a snapshot and that things will continue to improve, etc. but 
it runs afoul of the limitations of the IETF's document process- a static 
document reporting current test findings is almost instantly obsolete. This 
is a much larger problem than this draft, but it is something to consider when 
thinking about the content of this draft and how it will be interpreted, the 
audience, etc.

If the draft were to focus strictly on things which the *IETF* must fix in 
order to resolve outstanding problems with IPv6-only operation, those would be 
clearly actionable and new drafts written to resolve those issues could 
update this one, so that it's clear to future readers when something 
materially changes. In its current form, most of the noted broken things are 
related to specific implementations and therefore largely beyond the IETF's 
control (eg Skype, video game consoles, mobile phone stacks, etc). Unless it is 
updated with bis versions periodically when those issues are found to be 
resolved, it has the potential to mislead people as a source of information 
that they might use to determine if they should even consider trying this. Some 
of that information perhaps is better suited to a curated wiki, since it is 
easier to update it as the situation improves. FWIW, 
draft-donley-nat444-impacts has similar problems - very useful information, but 
not well-suited to s
 tatic documents.

I don't know if that's enough to block the document, and I'm not going to be 
upset if it's published as-is, but I thought it was something that IESG should 
consider in their evaluation of the document. Perhaps it's a matter of delaying 
it for a bit and touching the document with updates to keep it active until we 
feel like we've reached an equilibrium after a bit more IPv6 deployment over 
the next 6-12 or even 18 months.

Thanks,

Wes George


 -Original Message-
 From: ietf-announce-boun...@ietf.org [mailto:ietf-announce-
 boun...@ietf.org] On Behalf Of The IESG
 Sent: Friday, December 09, 2011 5:34 PM
 To: IETF-Announce
 Subject: Last Call: draft-arkko-ipv6-only-experience-04.txt
 (Experiences from an IPv6-Only Network) to Informational RFC


 The IESG has received a request from an individual submitter to
 consider
 the following document:
 - 'Experiences from an IPv6-Only Network'
   draft-arkko-ipv6-only-experience-04.txt as an Informational RFC

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2012-01-06. Exceptionally, comments may
 be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


This document discusses our experiences from moving a small number
 of
users to an IPv6-only network, with access to the IPv4-only parts of
the Internet via a NAT64 device.  The document covers practical
experiences as well as road blocks and opportunities for this type
 of
a network setup.  The document also makes some recommendations about
where such networks are applicable and what should be taken into
account in the network design.  The document also discusses further
work that is needed to make IPv6-only networking applicable in all
environments.




 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-arkko-ipv6-only-experience/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-arkko-ipv6-only-experience/


 No IPR declarations have been submitted directly on this I-D.


 ___
 IETF-Announce mailing list
 ietf-annou...@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf-announce

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Travel/Attendees list FAQ

2011-12-07 Thread George, Wes
Based on the discussion on the 82 attendees list, I put together a draft that 
provides a list of common questions (but not necessarily answers) that people 
ask when preparing to travel to a meeting. As the draft states, this is an 
attempt to provide a list of ideas for folks who can contribute to a wiki or 
host site (because they're familiar with the area), to help them ensure 
completeness of the information that they provide. It doesn't compel anyone 
(host, IETF, secretariat, etc) to do anything, merely makes recommendations.
I got some feedback on the -00 version from folks on the 82-attendees list, and 
I've updated the draft with an -01 version based on that feedback. I am now 
expanding the audience to the larger list so that I can get additional 
feedback. Please have a look and send comments my way.

I'm also open to suggestions as to the appropriate publication track for this 
document, whether I should look to have it sponsored as a GenArea doc or simply 
put it forward as an individual submission.

http://tools.ietf.org/html/draft-george-travel-faq

Thanks,

Wes George


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Travel/Attendees list FAQ

2011-12-07 Thread George, Wes
 From: Dave CROCKER [mailto:d...@dcrocker.net]
 Sent: Wednesday, December 07, 2011 9:28 AM
 To: George, Wes
 Cc: IETF Discussion
 Subject: Re: Travel/Attendees list FAQ


 However I suggest that the document cast itself as a snapshot of an on-
 going
 documentation process, with the master copy being an IETF Wiki; the
 document
 should contain a point to the wiki.
[WEG] There is currently a pointer to the wiki, but I'll have to think on how 
to update the text to make this distinction about how updates are managed. I'd 
like to hope that we can get to something quasi-complete in terms of the 
questions, since they should be relatively static and the answers are what 
changes from meeting to meeting and are stored in the wiki, with the idea that 
updates to this document could be handled through the draft process 
periodically (similar to other docs like the Tao).

 I'll also suggest that there be an on-going mailing list for discussing
 meeting
 logistics issues, rather than a different mailing list for each
 meeting.
 (ietf-meeting?)

[WEG] I think because you have different attendees for each meeting that this 
might be problematic. I didn't miss the email chatter for the last IETF meeting 
that I didn't attend, and in fact, the whole point of this draft is to try to 
cut down on said chatter. Perhaps the way to manage this is to have two lists - 
an IETF-meeting list, and then an xxattendees list, and then people interested 
in higher-level meeting logistics (not specific to one meeting) can manually 
subscribe to the IETF-meeting list, and the xxattendees list itself is simply 
subscribed to the ietf-meeting list for the duration of its relevant period, 
and then unsubscribed afterwards (or vice versa).

Thanks
Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Travel/Attendees list FAQ

2011-12-07 Thread George, Wes
 On Dec 7, 2011, at 7:11 AM, Margaret Wasserman wrote:

 
  What is the value in publishing a living document as an RFC (which
 inherently a static, archival document)?  Wouldn't it make more sense
 to convert the contents of this document to a Wiki page that we could
 jointly edit and maintain going forward?

 +1

 I think it's important that this be dynamic and easy to change.

 Bob

[WEG] I think that we're already off in the weeds based on an incorrect 
assumption, so I'd like to clarify before we get too far along with this. This 
is a list of the *questions* because they do not change much from one meeting 
to the next. The document already recommends that the *answers* which will be 
different for every venue be kept in a place where they are more easily updated.

From the abstract: This document attempts to provide a list of the common 
Frequently
   Asked Questions (FAQs) ... if
   they wish to pre-populate answers to some or all of these questions
   either in the IETF Wiki or a meeting-specific site, they have a
   reasonably complete list of ideas to draw from.

I'm going to take a crack at refining this text a bit based on Dave's prior 
feedback, but if I'm missing something as to why you're saying don't put this 
in an RFC because it changes too much please clarify.

Thanks
Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Travel/Attendees list FAQ

2011-12-07 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Melinda Shore

 I think it's great that Wes put together
 a proposal and I hope that it's seen as a starting point for
 a wiki or some such rather than as yet something else that
 needs an editor and needs an approval process and that isn't
 as lightweight and responsive as something like an attendees
 info sheet should be.


[WEG] For my part, since I've gone to the trouble of draftifying this, I plan 
to get my document to a point where I feel that it's reasonably complete (ie 
I'm not receiving any additional feedback on items that are missing) and 
publish via the individual submission process. As with most other RFCs, what 
folks choose to do with the document once it's published (use as a wiki/info 
website template, summarily ignore, etc) is really up to them. It was intended 
to be a (hopefully helpful) tool, and my best-case result would be that it is 
provided with the information that we typically give to hosts to assist them in 
hosting an IETF.
However, I purposely left any sort of formal direction to IAOC or the 
secretariat out of this document, at least partially because I think that this 
is simply one example of a recurring problem about how IETF should manage 
non-static info (cf previous discussions about official per-RFC wiki entries, 
etc), and I didn't want to have the solution to the generic problem be blocking 
for this specific example.

In the meantime, my hunch all along has been that if for some reason the 
baseline information necessary (not the answers to the questions) changed 
enough that this document was in need of significant updates, someone (maybe me 
if I'm still involved) would simply write an update to it.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Consensus Call: draft-weil-shared-transition-space-request

2011-12-06 Thread George, Wes
 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Doug Barton

 Thank you for confirming publicly that the issue here is not a
 technical
 one, but rather that the ISPs would prefer not to bear the costs of
 dealing with the problem that they helped create.
[WEG] Thank you for confirming publicly that you'd prefer to preach at/blame 
ambiguous entities (the ISPs) for perceived past sins as a way to make their 
problem seem illegitimate.
Yes, ISPs would rather not make a bad situation worse. We're already bearing 
costs to deploy IPv6, and eventually will be bearing the costs of deploying and 
supporting CGN no matter how distasteful we find it. We'd rather not add 
additional CGN breakage to the mix. This is primarily because we want our 
customers to be happy, and broken customers != happy customers. Yes, broken 
customers have associated support costs that we'd rather not pay, but that's 
secondary. What's mystifying and frustrating me is that some folks in the IETF 
refuse to believe us when we say that based on what *we* know about *our* 
networks and the CPE that *our* customers use, use of 1918 or squat space will 
be worse. You've made it clear that you don't think that the 90/10 problem is a 
large enough problem to justify a separate allocation, and it seems unlikely 
that anyone will convince you otherwise, apparently because this is somehow 
someone's fault and they should take responsibility for it. I'm not 
 sure what else I can say here. I'd love for you to be right and it's not a 
problem, but I'm not willing to stake my job on it. Are you?


 More seriously, it sounds to me like the most persuasive argument in
 favor of doing the new allocation boils down to simple extortion. Give
 us a $50,000,000 'gift' or we'll do bad things to the intahrnetz.

[WEG] Really? Solutions to operator problems = extortion? Glad to see that 
discourse here has degenerated to same extent it has in politics - when all 
else fails, resort to hyperbole, FUD, and namecalling...
And we wonder why we can't get better operator participation and representation 
here...

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Consensus Call: draft-weil-shared-transition-space-request

2011-12-05 Thread George, Wes
On Dec 4, 2011 10:40 AM, Joel jaeggli joe...@bogus.com wrote:


 10.170.127.192/27  link#12UCS 20 en3
 10.170.127.193 4c:47:45:56:44:58  UHLWIi422   34 en3
  1197
 10.170.127.207 127.0.0.1  UHS 00 lo0

And Cameron Byrne cb.li...@gmail.com wrote:
An additional fact is that Verizon reuses 10/8 across their network, 10/8 per 
region.
Net net, rfc1918 is used in cgn today. Squat space is also used in cgn today. 
Making an allocation creates another permutation of how cgns are deployed.
Furthermore, a /10 is not a large enough allocation to be the one solution 
everyone can converge on.


[WEG] I don't believe that anyone is suggesting that any one size of block fits 
all. I fully expect that networks of sufficient size would end up reusing the 
shared space multiple times for multiple NAT regions just like they would 1918 
space.
I also don't believe that the IETF could ever formally recommend using squat 
space given the known breakage cases that exist, especially since the party 
subject to the breakage may not be involved in the discussion of the calculated 
risk being taken. Put another way, existence proofs don't make it any better of 
an idea or reduce the risk of breakage.
This leaves either GUA space, which we're ostensibly trying not to waste on 
things that shouldn't use up the precious  resource, or 1918.
I don't think that anyone on here is saying that it's completely impossible to 
use 1918 for CGN. I think they are saying that it has enough breakage cases 
that it's not possible to say that it's good enough for all cases by itself.
Just as you say above that the size isn't good for all, you have multiple 
operators saying that 1918 as a solution is not good enough for all, along with 
technical and operational justifications as to why, and it mainly sounds like 
this is a question of whether IETF knows best trumps those justifications in 
determining whether they're legitimate problems or not.

Also, independent of whether VPN works or does not work if the host is using 
1918 space + NAT, there is an important distinction on the wireless CGN using 
1918 example that covers the other breakage case:
It's NAT44 in wireless (device directly to CGN), and not NAT444 as it would be 
in most broadband applications. It's only when you start talking about using a 
mobile device for connection sharing (MiFi or Phone WiFi hotspots, routers with 
LTE cards in them instead of wired uplinks, etc) that you're really comparing 
the two in a way that's directly applicable, since then you could have:
[local 1918 segment] -LAN- SOHO/res NAT router -WAN- [CGN 1918 block] -- 
CGN -- [PublicIP]

If these hotspot devices are doing NAT444 with private space on both LAN and 
WAN, vs doing NAT444 using Squat space on the WAN side vs doing NAT44 with a 
public address on the WAN side, that'd be good information to have, as it may 
be an existence proof one way or the other regarding whether having 1918 on 
both sides of a CPE router actually works.
However, it's worth noting that in most cases, the mobile provider owns the 
device being used as that intermediary, so they can explicitly configure and 
test it to ensure that it functions correctly in the case where there is 1918 
addresses on both LAN and WAN interface. There's no way to make that assumption 
with customer-provided CPE.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Consensus Call: draft-weil-shared-transition-space-request

2011-12-05 Thread George, Wes
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Cameron 
Byrne

 The ietf did act. It is called ipv6.

[WEG] sarcasm thanks for that wonderfully relevant and technical rebuttal. 
I'm so glad we've stopped debating philosophy and religion in this thread and 
gotten down to solving technical problems. I'll be sure to tell all of my 
customers (and my shareholders, for that matter) that when they call to ask why 
their new internet-enabled TV, Xbox Live/PSN, Skype, etc doesn't work on my 
IETF-approved (IPv6-only) Internet service. /sarcasm

I don't know how much clearer I can make this, so I'll keep repeating it until 
it hopefully sinks in:
Independent of whether we have any left, continued support for IPv4 in the home 
and enterprise is *non-negotiable*, no matter how many people stand atop the 
IETF soapbox and decree that it MUST be otherwise because IPv6 exists. I would 
also like it to be different, but there are a *lot* of stars that have to align 
before it actually is, most of which are not in my control. It's 
extraordinarily unproductive to vilify a group of operators as the singular 
scapegoat for IPv6's failure to generate critical mass when all they're trying 
to do is keep their network running and their customers happy, especially since 
they're simultaneously deploying IPv6, not using CGN to avoid it as folks on 
this list seem so quick to assume. If you have a way to convince my customers 
(or anyone else's) that they don't need IPv4 anymore, be my guest.

Until then, let's stick to solutions to the actual problem, shall we? Saying 
that IPv6 is a solution to an IPv4 CGN implementation problem is like saying 
that a railroad car is a perfectly acceptable alternative to renting a truck to 
move the contents of my house across town without considering whether both my 
source and destination are in reasonable proximity to the railroad tracks. Or 
worse yet, saying that I shouldn't be moving house in the first place because 
trucks are scarce and less efficient than rail cars.


 And, they underscored that point by rejecting various past attempts at 
 expanding private ipv4 space like 240/4.

 [WEG] Every argument I've ever heard regarding 240/4 was related to the 
difficulty of ensuring that it was going to work *everywhere* just like the 
rest of the currently allocated IPv4 space. It's similar to the problems 
associated with going to CIDR, but the installed base is much, much larger. The 
concern was that most, if not all router and host stacks would have to be 
updated to make it work. Even if it was only commenting out a few lines of 
code, that was viewed as a virtual impossibility, making it impractical to 
consider releasing the space for general use. I'm disappointed that the space 
wasn't simply released (even as additional private/experimental space) with the 
caveat that it may not work on old equipment, and then allow the market to 
decide how important it was to fix such equipment, even if just for specific 
use cases rather than globally routable space.
IPv6 figured into the discussion, but only as a follow-on to the above. That 
is, it makes far more sense to expend efforts to ensure good support for IPv6 
if we're proposing modifying the host stacks of lots of devices, as well as the 
idea that by the time we fixed 240/4, IPv6 would be well-deployed, and everyone 
would have their own personal 128 bit unicorn to ride, making this a case of 
too little too late. Depending on how far back in time you rewind, I think at 
least that latter point has been proven wrong repeatedly, and subsequent 
attempts to cut our losses and try to fix a previous poor assumption have been 
unsuccessful.
I think that when people look back on the IPv4 to IPv6 transition, 240/4 will 
be a great example of IETF's hubris and failure to use all of the tools 
available to them in the name of upholding some misguided sense of principles 
(no matter how noble they might be) or forcing people to do it our way because 
there's no way that we could be wrong. I would still support releasing 240/4, 
but I don't think that it's a solution for this problem.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Consensus Call: draft-weil-shared-transition-space-request

2011-11-30 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Randy Bush

 talk to free.fr, camron byrne, ...  there are roadmaps.

 but this proposal is not about migrating to ipv6.  it is about ipv4
 life extension and nat444 4ever.  to hell with that.

[WEG] let's see... free.fr = 6rd. Cameron Byrne (TMO) = NAT64 (which requires 
IPv6-capable end devices) + squatting on routable space (*not* 1918) + CGN.
Please explain how either of those help to ensure that I can stay in business, 
given that my business requires me to provide functional IPv4 service to 
devices that my *customers* own which do not support IPv6, *IN ADDITION TO* 
deploying IPv6 [citations: 1, 2, 3, 4] for devices that do.
Should I stop selling IPv4 service citing the IETF's principles on the matter? 
Tell all of my customers that they must spend hundreds or thousands of dollars 
to upgrade all of their otherwise functional IP-capable devices because the old 
ones are obsolete (not to mention that the current new ones *still* might not 
support IPv6)?
I admit that DSLite would potentially help, but that requires support in CPE 
that is currently extremely limited, and my business model does not allow for 
me to purchase a new router for all X Million of my customers anyway.
*taps the mic, clears throat*
RandyBush I strongly encourage all of my competitors to do the above. 
/RandyBush

snip
 this has become a contest of wills, not a technical discussion.
[WEG] only because a number of folks, including you, insist on arguing about 
the principle of the thing and making the internet work better and IPv4 
life support while rejecting technical arguments that you don't believe/like 
despite hearing them from multiple operators and other sources.
This is turning into a referendum on CGN and whether the industry as a whole 
has deployed IPv6 fast enough for a set of armchair quarterbacks' taste, and 
now people seem content to wag fingers and revel in saying I told you so... 
because business reality didn't line up with their view of how the universe 
should work. This is akin to standing on the deck of the Titanic and yelling I 
told you we needed more lifeboats! instead of finding a piece of wood to float 
on.

CGN = RFC6264. I'm not sure why it passed IETF LC or IESG vote given the 
resistance this draft is getting, but if you don't like it because it breaks 
the internet and extends IPv4, then write the draft to make that historic, 
along with NAT44, and any other astoundingly bad ideas that IETF has had for 
extending IPv4 beyond its original design life. For that matter, write a draft 
to make IPv4 historic. I (along with several authors of this draft) am already 
trying to update IETF's official position (for some value of official) from 
version agnostic to IPv6 is a requirement, and I'd welcome the help.

But stop conflating a practical solution to a practical problem with whether 
IPv6 is deployed or whether CGN (and IPv4) is fundamentally bad.

I've been conflicted on this draft all along. I hate the idea for all the same 
reasons everyone else does, and I'm just as unhappy that IPv6 isn't further 
along. But I see few good alternatives, and I'm not sure it's worth cutting off 
my nose to spite my face, so I chose to stop opposing it. You may be correct, 
that RFC1918 would work in the majority of cases, and that people are likely to 
use this new space for off-label uses the first time they run into an RFC1918 
conflict. So what? Is squatting on allocated space really the better idea? What 
about people who legitimately *can't* use RFC1918 space? Are they just SOL, or 
are you convinced that they're lying? As far as I can tell, your argument 
regarding this being used as RFC1918 annex is - people are idiots and they'll 
do things we tell them not to, despite RFC that says 'Very Bad Things will 
happen if you do x', so we shouldn't even give them the option. The problem 
with idiot-proofing is that there are always better
  idiots.

Wes George

CF
1 http://www.timewarnercable.com/SoCal/support/IPv6.html
2 http://www.comcast6.net/
3 
http://ww2.cox.com/residential/idaho/support/internet/article.cox?articleId=%7B0bced860-9666-11df-6baf-%7D
4 
http://www.att.com/esupport/article.jsp?sid=KB409112cv=812_requestid=723971#fbid=V_Bys5OCNCJ



This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this 

RE: An Antitrust Policy for the IETF

2011-11-29 Thread George, Wes
Tl;dr version: I think that there is value in having IETF legal counsel 
evaluate us against other SDOs specifically regarding considerations around 
membership (or lack thereof), voting (or lack thereof), and openness (or lack 
thereof).
That would help us to determine if this is really something we need to 
pursue/be concerned about, because it would help to determine if IETF is just 
like the other SDOs who have an antitrust policy, or if they are materially 
different enough that it's probably not necessary.

Responding to a couple of specific points inline below...

Wes George

 -Original Message-
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
 Donald Eastlake

   (c) The IETF does not have any members

 The governance of the I* is complicated but I don't think any court
 would have any trouble finding that, for some purposes, the membership
 of the IETF is those qualified to serve as voting noncom members.

[WEG] Yes, but that is by definition not restricted other than to ensure that 
those involved have some familiarity with IETF by virtue of having paid 
registration for multiple meetings. Note the distinction here - while 3777 says 
attended it is not more specific on what can be considered attendance. One 
could easily register and skip every single meeting if it suited their purposes 
- we're not checking blue sheets here... Further, eligibility as a voting 
nomcom member affords no additional influence in the process of defining 
standards. It only provides influence if one is randomly selected (via a 
publicly published algorithm) to participate on nomcom, and even then, that is 
only to install leadership, not to dictate technical policy. Yes, there is a 
relationship between nominated leaders and technical standards, but that's a 
stretch IMO.

   (d) People participate in the IETF as individuals
[WEG] this would be tough to defend. We say that, but we still allow people to 
place a company affiliation on their badge and on any drafts that they write, 
use company email addresses (including those who forcibly append stupid legal 
disclaimers at the end of every message :-/ ), and run afoul of company IPR, 
not to mention the fact that the vast majority of people attending meetings are 
funded by their company, both in time, travel costs, and registration fees.
  
   (f) The IETF does not vote

 Legally, I don't think there is much difference between many IETF
 decision procedures and the voice voting commonly used in various
 assemblies.

[WEG] I disagree. Anyone can participate in the unofficial votes that the IETF 
holds in WG meetings and on mailing lists. The vote can be skewed by tourists 
in the WG meetings, people who hum particularly loudly, the acoustics of the 
room, people who join the WG mailing list simply to voice an opinion on a 
certain draft or issue, etc, etc. And the votes are untallied, non-binding, 
primarily serving as guidance to WG and IESG leadership. Many other SDOs have 
very defined requirements around what is considered a member and when you can 
vote (such as IEEE, which requires a certain amount of documented attendance 
before one can vote on technical proposals: 
http://ieee802.org/3/rules/member.html). Votes are also tallied and used as 
official decisions.


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: IPv6 support in hotel contract?

2011-10-21 Thread George, Wes
 From: Andrew Allen [mailto:aal...@rim.com]
 We can put all kinds of wonderful constraints on hotels if we want to -
 [snip] - then we will likely never be able to meet anywhere.

[WEG] I am not suggesting that this be a deal-breaker constraint. We have quite 
a number of nice to have items that we will ask for, but not necessarily take 
our business elsewhere if we do not get. The sense I get from IAOC is that 
dates, capacity, and cost are the constraints. IPv6 support is window dressing 
(or deck chairs, depending on your perspective).

 IF IPv6 really requires IETF to use its business to influence hotels to
 adopt it then its a technolgy that deserves to go the way of the DoDo.
 IPv6 will be adopted because it is needed and brings commerical
 benefits to those that deploy it.

[WEG] This is not an attempt to force *whether* IPv6 will be deployed, but 
when. Hotels are sort of an extension of the consumer space - right now, they 
don't know/care what IPv6 is, nor see a reason why it's necessary. It is quite 
unlikely that your average person will walk to the counter and say, your 
internet service is partially broken because it doesn't support IPv6. It is 
even less likely that this will happen enough times that they say, gosh, 
perhaps we need to look into this eye pee vee six thing... IETF has some 
leverage, and by definition should be on the early adopter curve, so I'm simply 
suggesting that they use it to accelerate the timeline a bit.

 From: Cullen Jennings [mailto:flu...@cisco.com]
 I love the taste of dog food, but v6 in the hotel is not something that I 
 find critical to accomplish the
 task I come to IETF to get done.

[WEG] We're working contracts for hotel venues 3+ years out at this point. How 
long are you willing to assume that IPv6 will not be critical to tasks that you 
need to do at IETF and that the IPv4 service in the hotel will be an acceptable 
alternative?

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Anotherj RFP without IETF community input (was: Re: RFP for Remote Participation Services Specifications Development)

2011-10-20 Thread George, Wes
I'm also completely mystified as to why IPv6 support for all proposed/requested 
features is not an explicitly stated requirement, even at this phase. It's not 
always as simple as we'll make sure we make it IPv6 capable when we implement 
it... with the sorts of solutions you're looking for here. Knowing that we 
require this at this phase would allow for some vendor self-selection or proper 
time to fix the gaps prior to formal proposals, so that we don't end up with 
lip service around IPv6 support.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


IPv6 support in hotel contract?

2011-10-20 Thread George, Wes
My last message caused something else to occur to me - there has been a lot of 
discussion both here and at NANOG about hotels being woefully underprepared for 
the internet (and address) use that their guests generate when a conference 
full of geeks and their multiple devices per person descend upon them. 
Sometimes the IETF is successful at convincing the hotel to let them take over 
the internet service in the guest rooms, sometimes not.

Perhaps we can kill two birds with one stone by starting to require IPv6 
service in the guest rooms when we enter into negotiations with hotels. If they 
don't have it, we'll be happy to temporarily take over the internet service, or 
assist them in getting it enabled permanently in their existing network, and if 
neither of those options are acceptable, it provides negotiating leverage on 
other things. This also has the net effect of starting to make it clear to 
hotel management that IPv6 is going to start being mandatory for some subset of 
their guests before too much longer.

I realize that having something in the contract doesn't mean that we're any 
more likely to get it. But the fact that it's in the contract makes a statement 
in and of itself. IAOC, any reason why this couldn't be added, especially given 
how far in advance you're negotiating with venues?

Thanks,

Wes George



This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: IPv6 support in hotel contract?

2011-10-20 Thread George, Wes
 From: Joel jaeggli [mailto:joe...@bogus.com]

  At least, we should start *trying* to get IPv6 service from hotels.
  We may have a very hard time getting it, but the fact that customers
  are starting to *ask* for it will help make hotels aware of IPv6.

 I see no pointing in asking for something that a hotel agent is going
 to
 not be able to respond to.

 if you want a brown M  M's crontract you're going to actually have to
 work with an agent that can grok and then meet your requirements.

[WEG]] Joel, I think this is a spurious line of logic. We already have plenty 
of brown MMs requirements. We bring in our own internet access (sometimes by 
running new fiber into the building). We ask for the ability to take over the 
hotel's guest room wireless network or at least the uplink. If we get told no, 
we try (I hope) to ask about their abilities to cope with an extremely high 
amount of simultaneous internet usage, we ask lots of questions about the 
technical logistics of putting on a conference of this size, including using 
their power and cabling to provide wireless in common areas, interacting with 
their PA system, using their equipment, etc, and the hotel agent either 
answers them directly or finds someone who can.
We don't generally work with Roscoe's Motor Lodge whose internet service is a 
single residential AP managed by my brother Darrel. These are international 
hotel chains, usually with contracts to national/international corporations to 
professionally manage their guest internet services. If we ask, the response is 
likely to be well, no one's ever asked for that before... but that should be 
followed with ...but we'll find out...

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: 240/4 unreservation (was RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC)

2011-09-27 Thread George, Wes
From: ietf-boun...@ietf.org On Behalf Of Iljitsch van Beijnum

And who cares anyway? If people feel it's a good idea to use addresses in the 
240/4 block, more power to them. That saves more usable addresses for other 
uses.

WEG] The problem is that people really can't today, because vendors mostly do 
not want to implement something for general consumption that is deliberately 
out of compliance with one or more RFCs. My point in asking the question was 
that I'm not sure that we need to define what use cases it can/should be used 
for as much as we simply need to unreserve it and provide some guidance about 
risks.
IMO, the question tree on determining what (if any) course of action to take is 
something like this:
1) should it be unreserved for *any* reason, or are we just going to stick with 
the 5735 status quo (Future use)?
2) should it be made into more global unicast space in all or in part?
3) should it be simply unreserved as non-global space with a few caveats about 
limitations, and leave the use cases to the consenting adults considering its 
use?
4) should it have a designated use(s) to the exclusion of all not explicitly 
defined?

For #1, My view is that there's no good reason to maintain the reservation, 
because then essentially no one can use it, and the likelihood of someone 
coming up with a use for it that justifies holding it in reserve for future 
use continues to drop. So it's more a question of how we might use the space, 
and the justification for doing any one of several things. I don't agree that 
the burden of proof should favor doing nothing.
For #2, We know that it is not trivial to get it working for this purpose due 
to the critical mass of support required. But in some cases where there is 
tight control over equipment and networks, and a community of interest that 
routinely communicates between one another across a portion of the Internet, 
perhaps it's possible. I'm thinking that this makes more sense as a means to 
buy us time to get IPv6 deployments completed if CGN ends up being bad and the 
demand for global IPv4 space gets high enough that any tradeoffs associated 
with using this space as global unicast are deemed acceptable. It may be that 
we carve the space up so that some of it is tentatively reserved for global 
unicast, but not released to IANA until some later point to give folks time to 
fix things. I agree that this one has a lot of risk that it ends up simply 
prolonging IPv4 without aiding the transition to IPv6.
For #3, it's mainly about the caveats to its use - it may not be supported by 
legacy equipment, we have to carve out 255.255.255.255 (or perhaps something 
between 255/8 and 255.255.255/24) for broadcast, it MUST NOT show up in the 
global routing table, etc
For #4 - I'm not sure we can come up with enough designated uses at the outset 
to not have to continue evaluating new ones all of the time and end up needing 
a WG just to keep up with the discussion. So far, we've heard about its use 
within a mobile provider in place of RFC1918 as Mobile UE addresses behind a 
CGN that's already in place today. The folks wanting a shared CGN address pool 
have already turned down 240/4 because of the limited support within the legacy 
home router CPE gear. What other potential uses are there? 1918 space in 
enterprises where all of 1918 is already in use (eg mergers, extranets, etc)?
I think Iljitsch's point is a good one - why do we care how people use it? As 
long as we can give them some guidance about how *not* to use it in order to 
avoid breakage, I think we're doing our jobs.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

2011-09-26 Thread George, Wes
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Keith 
Moore
Sent: Friday, September 23, 2011 10:04 PM
To: Cameron Byrne
Cc: IETF Discussion
Subject: Re: Last Call: draft-weil-shared-transition-space-request-03.txt 
(IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

Furthermore, I find this draft's statements about we are trying real hard to 
deploy ipv6 as not convincing... we are 10 years in on v6, no? I only 
seriously deployed ipv6 when it was clear the business had to deploy ipv6 
there were no other choices.

WEG] I really don't think it's useful to discuss penetration of serious IPv6 
deployment based on absolute timescale for precisely that reason - until 
there's a business reason, being visionary or leaders in the space doesn't 
convince enough money to be shaken loose for that particular budget cycle or 
planning window. I think it's more useful to look at the progress made since 
IANA exhaust actually happened and since some testing showed how bad CGN might 
be, signifying some idea of when this actually got real and at the next 12-18 
months in terms of major last-mile providers and their rollout plans.

ARIN is looking for the IETF to bless this because they know it's bad, they 
know this is a step in the wrong direction but the IETF made me do it...

WEG] Well, no. ARIN is looking for the IETF to allocate this because they were 
told by the IAB that they couldn't do it on their own, which sort of removes 
the teeth from the policy that their membership approved. I think that ARIN 
happened to be the first forum that the folks suggesting this (very much not 
new) idea found enough support to move it forward. That said, I don't think 
that support for the idea is in any way specific to ARIN, it just came up at 
the right place and time. I  think that more and more folks (myself included) 
are coming to the realization that the need is legitimate, and we sort of need 
to hold our noses and do it, and focus on making it less harmful rather than 
blocking it on philosophical grounds.

Wes George



This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


240/4 unreservation (was RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC)

2011-09-26 Thread George, Wes

From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Keith 
Moore
Sent: Friday, September 23, 2011 10:04 PM
To: Cameron Byrne
Cc: IETF Discussion
Subject: Re: Last Call: draft-weil-shared-transition-space-request-03.txt 
(IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

On Sep 23, 2011, at 9:53 PM, Cameron Byrne wrote:
So if there is going to be breakage, and folks are willing to fix it over time 
because the good outweighs the bad (I personally do not believe this), then why 
not dedicate 240/4 for this purpose? The 240/4 work has been shot down multiple 
times ( I don't know the history ), are we now changing the rules for the end 
run ?

It's hard to know for sure, but I believe there's greater risk associated with 
use of 240/4 than with a /10 from existing public IPv4 space.  That is, I 
think more software would be needed to allow 240/4 to be used reliably.

WEG] you know, the more I think about this line of logic, the more I wonder 
about it.
In essence, the 240/4 problem is that lots of host and router implementations 
have one or more functions in their input validation code that says 240/4 == 
invalid thus preventing you from configuring or using it. To my (admittedly 
oversimplified) view, this is a simple matter of:

1)  Search source code for 240

2)  Comment out any relevant code you find

3)  Recompile, test (changes only), ship
I'd be happy for one or more folks who have some experience with the 
appropriate bits of Windows, Linux, MacOS, IOS, JunOS source code would explain 
where I'm oversimplifying.

Now, compare that with the discussion of adding a new set of non-unique address 
space where you likely have to add code to catch this if you care about the 
scope of the address that you've been assigned.
The authors (or at least one of them) of draft-bdgks maintain that they've 
discussed this with vendors 
(http://www.ietf.org/mail-archive/web/opsawg/current/msg01879.html, search for 
Linksys to find the relevant section of the message) and the vendors seem 
willing to make code changes in support of this, at least in new gear. Now this 
doesn't represent a commitment nor a critical mass necessarily, but I'm 
wondering why 240/4 is so much harder?

Also, I don't see why we don't use all of the tools in our toolkit. We're out 
of IANA space, except for a whole /4, which keeps getting shot down due to the 
perceived problems with getting global support, when there are probably 
multiple use cases that absolutely don't require global support. Why haven't we 
gone ahead and unreserved the space, and then let those interested in using it 
beat on the appropriate folks to fix it, rather than not even trying? I think 
that it would be fully possible to caveat use of the space appropriately so 
that people know what the risks are, but right now it's essentially useless 
even for those who might be able to try.
Seems wasteful, no?

I'm willing to write a draft about it if there are people willing to support 
it, but I only have so many windmills that I can tilt at per cycle, so I'd like 
to hear support either privately or publicly before I undertake it.

Wes George


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: 240/4 unreservation (was RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC)

2011-09-26 Thread George, Wes
From: ietf-boun...@ietf.orgmailto:ietf-boun...@ietf.org 
[mailto:ietf-boun...@ietf.org] On Behalf Of Keith Moore
Sent: Friday, September 23, 2011 10:04 PM

The problem is in the zillions of systems in the field that have assumptions 
about 240/4 wired into them, most of which either have no automatic upgrade 
mechanism, aren't set up to use it, or aren't being maintained.
snip
Honestly I'd guess that if vendors started changing their code today, it would 
be 10 years before 240/4 could be widely used in the field.


WEG] See that's the point, I think we keep looking at this from a boil the 
ocean perspective. The question is not, could we use 240/4 as more global 
unicast space? as the ship sailed on that years ago when IETF apparently 
decided it was too hard to change and nothing should be done.
The question is, if the space were unreserved, are there valid use cases where 
networks within a given administrative control might be able to make use of it?
This idea of limited use puts the impetus on the network/operator itself to 
identify a use case and force their vendors to confirm support for the space, 
but it makes it more likely that for that definition of widely used it would 
be successful. But if IETF/IANA removes the reservation, this means means that 
people can go in and check in the update to the 3 lines of BSD kernel code 
(based on a private reply I received on the matter) necessary to remove the 
block, vendors can stop putting that logic into new devices, etc, thus making 
it more attractive to attempt to use the space from that point forward.
I don't expect this to be a perfect solution for legacy IPv4-only devices, but 
I do expect that it could have some use, especially when compared with other 
alternatives.

Cameron's example is a case in point - you have a mobile provider who for the 
most part tells the vendors exactly what features their user devices need to 
support and they are built to spec, plus a closed network with NAT at the edges 
that is currently squatting on public space. This means that a large amount (or 
possibly all) of the devices that would need to support use of this space are 
within their administrative control, and they would be responsible for updating 
the code to a version that won't reject 240/4, and they could contain it within 
their environment by keeping it inside of the NAT border.

Wes George


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

2011-09-23 Thread George, Wes
-Original Message-
From: Jari Arkko [mailto:jari.ar...@piuha.net]
Sent: Thursday, September 22, 2011 5:59 PM
To: George, Wes
Cc: ietf@ietf.org; draft-weil-shared-transition-space-requ...@tools.ietf.org; 
draft-bdgks-arin-shared-transition-sp...@tools.ietf.org
Subject: Re: Last Call: draft-weil-shared-transition-space-request-03.txt 
(IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

what I am asking should not be a long piece of text or require a huge amount of 
analysis. Basically, it should state that the effects are here and that these 
undesirable implications may be seen, and that this type of IETF 
specifications need revision. Making those actual revisions should be done in 
separate documents.

WEG] Jari, effects and implications probably wouldn't add much. However, I'm 
wondering about the value of maintaining two separate drafts (-weil and bdgks) 
if weil is now being asked to include these things that are mostly already 
covered in bdgks.
Regarding this type of IETF specifications need revision - would you be ok 
with something like, any existing standard that prescribes different behavior 
in the presence of RFC1918 (or non-unique) addresses will need to be 
evaluated. ?
If you're wanting something more in-depth than that, I think you're 
underestimating the work involved. That in and of itself could be a whole 
draft. If we're going to undertake it, I don't want to do it half-assed, and I 
would rather not see it be gating to these drafts.


 But if we are unsure and somehow asked ARIN to make the reservation anyway, 
 the address space would already be nailed down, the knowledge of the actual 
 usable space would leak and everyone would be using it anyway.
WEG] I think that this is a minor concern at best. ARIN can be explicitly 
instructed not to divulge the reservation. This is something that could be 
reserved internally by ARIN staff without publishing it publicly.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

2011-09-23 Thread George, Wes
-Original Message-
From: Owen DeLong [mailto:o...@delong.com]
Sent: Thursday, September 22, 2011 6:32 PM
To: George, Wes
Cc: Jari Arkko; ietf@ietf.org; 
draft-weil-shared-transition-space-requ...@tools.ietf.org; 
draft-bdgks-arin-shared-transition-sp...@tools.ietf.org
Subject: Re: Last Call: draft-weil-shared-transition-space-request-03.txt 
(IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

 2) Should draft-weil or draft-bdgks or both be formal updates to RFC1918 as 
 additional private-scope use cases?

I don't believe so. I believe that conflating these drafts with RFC-1918 would 
only serve to further increase the
probability that someone would consider this additional space for the same 
purpose. I would not oppose
adding a reference to RFC-1918 that links to these documents as additional 
related considerations.

WEG] adding a reference to RFC1918 that links to... means updating RFC1918, 
which is why I suggested it. It is not necessary to rewrite/replace/obsolete 
1918, and I believe that some of the language that you added to bdgks after our 
discussion about how these cases are different from 1918 would be fine to help 
prevent conflation between the two. It's incumbent upon us to ensure that the 
draft is very crisp in defining acceptable and unacceptable uses of the space 
and its relationship to existing RFC1918 uses, and I believe that this is quite 
doable. Regarding increased risk of off-label use, all we can say is don't do 
this and only do this using the strongest language we feel appropriate. What 
implementers ultimately decide to do will be driven by their individual 
business and technical needs more than whether or not we choose to update 1918 
formally.


There is urgency to make the space available for use, so, the split you 
describe does not actually help. The urgency
is to make this space available before providers start having to deploy NAT444 
without it, or, at this point, more
accurately, to limit the amount of NAT444 deployed using GUA, Squat Space, or 
any of the other alternatives
that these drafts show are a significantly worse alternative vs. this /10 
shared transition space.
Pushing draft weil back as you describe would be extremely harmful IMHO.

WEG] this is exactly the type of hand-waving I'm trying to avoid when 
discussing whether there's actually this much urgency and what is driving it. 
While I've heard good support for this reservation of shared transition space, 
and the concern that if we screw around for too long the address space will be 
gone, I have not heard anyone saying I need this within the next few weeks (or 
even months) or I'm going to have to do something else. It's been over a year 
since this round of discussion started (with 
draft-weil-opsawg-provider-address-space-00), and yet no one has unequivocally 
said I'm being materially impacted by your failure to get this done *right 
now*. As may be obvious, I work for a broadband residential ISP. This idea of 
when/if we have to do CGN is pretty important to us and to my colleagues in the 
industry right now, and I'm not hearing event horizons earlier than 12-18 
months. If anything, people are starting to look at this and say, wow, this is 
going to suc
 k, I wonder how long I can hold it off? So I simply don't see the necessity 
for short-circuiting the process. Even if the timeframe is more like 6 months, 
we still have time to do this correctly.
I speak for no one but myself, but if you fall into the category of needing 
this address space ASAP, you'd be wise to speak up to lend credence to the 
perceived sense of urgency.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

2011-09-23 Thread George, Wes
-Original Message-
From: Benson Schliesser [mailto:bschl...@cisco.com]
Sent: Friday, September 23, 2011 1:21 AM
To: Jari Arkko
Cc: draft-bdgks-arin-shared-transition-sp...@tools.ietf.org; ietf@ietf.org; 
draft-weil-shared-transition-space-requ...@tools.ietf.org; George, Wes
Subject: Re: Last Call: draft-weil-shared-transition-space-request-03.txt 
(IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

Given constraints on existing IPv4 inventory (i.e. we're running out of the
stuff), our desire has been to have draft-weil proceed without delay.  snip  
However, I would like to make sure we don't lose sight of the need for some 
urgency with draft-weil.

WEG] I won't repeat my comments to Owen here, but I will note that if the 
concern is about the availability of the address space, my suggestion would 
allow us to ensure it's available without any artificial (?) sense of urgency 
over getting the documents to a form that we're happy with.

 1) Does IETF recommend the practice of inferring address scope in IPv4 based
 on address/bit value (the actual numbers), and then using this to trigger
 different behavior based on that inferred scope?

 We could probably have varying opinions on this, but I think the reality is
 that software *does* depend on specific bit values, for better or worse. I
 propose we spend our effort elsewhere, we can't change the situation.

So what would this translate to, in terms of updates to draft-weil and/or
draft-bdgks?  I think it's safe to say that address-inferred scope will
break in a number of circumstances - basically, every time an address+scope
pairing is not what the implementation expects.  And this concern exists for
any new reservation that we make for scope purposes.

As you pointed out, draft-bdgks makes note that either GUA or the Shared
Transition Space (STS) will have a similar effect on existing
implementations when deployed behind a NAT. The only way to avoid these
impacts is to use RFC1918 space, because it's already well-known, which
frequently is not an option (for reasons described in draft-bdgks).

WEG] my thought is that it's useful to say exactly that - this exists, so if 
you're going to do it to avoid breakage, know that there's now additional space 
to be aware of, especially if we go the route of updating RFC1918. I do 
appreciate the clarification of the difference between deriving address scope 
based on bit value for defined-scope values vs. assuming that everything not 
included in that defined-scope of private space could be unique and global, but 
I'm not sure that particular distinction is important in the context of these 
drafts. Similarly, the idea that squatting on other GUA space has a similar 
problem is mostly interesting as a justification for doing STS instead of 
squatting, and so that idea is probably minimally important in the grand scheme 
of things.

 2) Should draft-weil or draft-bdgks or both be formal updates to RFC1918 as
 additional private-scope use cases?

 My personal concern was with making the impacts clear, but I think other
 people in the IESG have commented on the updates aspect. I personally think it
 would be useful if draft-weil updated RFC 1918, because then when someone
 looks up RFC 1918 from the web site they would see the Updates: header and go
 read the new RFC as well.

We should be somewhat careful with this. I respect Wes' comments around
updating existing documents etc. But we would need to update RFC1918 in a
way that reflects the difference in scopes. The STS may have similar
semantics as RFC1918 space, in that it's non-routable on the Internet etc.
But it is not meant to be used in the same scope. While it would be
appropriate (when possible) to use RFC1918 space inside a CGN, it would not
be appropriate to use STS in many of the same places RFC1918 space is used.

WEG] Agree, the wording and the distinction between the use cases are 
important, but I believe it is possible to articulate it properly. I think that 
crispness and clarity is required anyway, in order to clearly explain why these 
use cases are not simply solved by use of existing RFC1918 space. BDGKS is 
getting there, so let's refine that to address both your concern and mine.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout

RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

2011-09-22 Thread George, Wes
-Original Message-
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Jari 
Arkko
Sent: Thursday, September 22, 2011 2:35 PM
To: ietf@ietf.org; draft-weil-shared-transition-space-requ...@tools.ietf.org
Subject: Re: Last Call: draft-weil-shared-transition-space-request-03.txt 
(IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC

So here's what I would like to propose. The document goes forward but we make a 
much clearer statement with regards to the implications both for applications 
out there, as well as for subsequent IETF work:

- what types of impacts may be felt by the rest of the network (not the ISP 
that is deploying NAT444)
- what kinds of application practices may be affected
- what IETF specifications may need revision due to this (e.g., do we need to 
revise ICE etc)

Jari -
It's unclear from your statement if you're proposing adding the above to this 
draft or to a subsequent draft.

To respond to your concerns and recommendation, I think that there are three 
separate issues here that merit some discussion:

1) Does IETF recommend the practice of inferring address scope in IPv4 based on 
address/bit value (the actual numbers), and then using this to trigger 
different behavior based on that inferred scope?

2) Should draft-weil or draft-bdgks or both be formal updates to RFC1918 as 
additional private-scope use cases?

3) Independent of consensus on the state of the *draft* directing it to happen, 
is there consensus on the *idea* that the /10 of IPv4 space should be reserved 
as shared transition space?

My own opinion on each question:

1) We do link the scope and bit values pretty closely in IPv6. Multicast (Class 
D) is definitely a scope link, and RFC6250 doesn't say otherwise, though it 
would have been a recent opportunity to clarify our position. My sense is that 
there are a number of standards (notably 3056) that recommend specific behavior 
when private-scope or non-unique addresses are used, but the terms behind a 
NAT, RFC1918 addresses and private addresses are often used 
interchangeably, thus reinforcing this link between scope and value. However, 
draft-bdkgs section 4.1.2 implies that this is not a valid assumption to make, 
but your concerns over what breaks and how to test support the idea of a link, 
which is why I bring up the question.
I think that it might be useful to formalize this link, but I'm not sure if 
that belongs in these drafts, and I don't think that it's gating to them moving 
forward.

2) I really believe that one or both drafts should either be an update or -bis 
document for RFC1918. I believe that they are in essence documenting additional 
use cases for private scope address that are beyond what was covered in 
RFC1918, with the added requirement that they cannot conflict with the existing 
space. While the address space and use cases are not interchangeable for 
reasons documented in draft-bdgks, most of the same considerations regarding 
usage (how not to break things) apply to both. Formally updating RFC1918 would 
at least give implementers a warning that there is new space to test for 
wherever 1918 is referenced in an existing standard and should therefore 
address your concern.
Based on your proposal, if we don't formally update 1918, we end up having to 
go through existing standards to find places where the authors used RFC1918 
interchangeably with non-unique addresses or private-scope address space. 
We would then have to evaluate if they used this as an indicator to recommend a 
different behavior in cases where one can infer the address scope based on the 
bit value and decide whether those cases apply to this new space or not. I 
think that using 1918 as a baseline and only documenting items which are unique 
considerations for this space and application represents a lot less work than 
what you're proposing above, whether it's part of this draft or its own work.

3) The reason I bring up consensus for the idea rather than the document is 
that there seems to be some urgency behind getting *something* approved to make 
the allocation happen, but it seems to be driving this strange behavior to push 
through incomplete documents and sort out the details in subsequent drafts.
Assuming that it is in fact necessary to get the allocation completed rapidly, 
I'd rather see us split the logistics of making that happen from the process 
required to produce consensus documents. This may be as simple as IAB or IESG 
giving ARIN (and/or IANA) provisional clearance to allocate or reserve the 
space on the belief that there is consensus to make the reservation, but that 
we want our documentation in order before it is made public for use. That 
removes any pressure to push the documents through before they are ready, while 
still ensuring that the address space is available when we are happy with the 
documentation. If for some reason the document fails to achieve consensus in 
its final form,