Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
Hi Arturo,

diffcult for us, english speaking people other than western,
Section 4 has been moved.

thanks for your comments,

-Hui


2013/7/11 Arturo Servin arturo.ser...@gmail.com


 Great document, I really liked.

 Same as SM I would suggest change western for something else.

 And I would also suggest to move section 4 before explaining the
 titles. I guess the reading would be much easier.

 Regards,
 as

 On 7/10/13 9:55 PM, S Moonesamy wrote:
  Hi Deng Hui,
  At 17:04 10-07-2013, Hui Deng wrote:
  We submitted two drafts to help people here to correctly call chinese
  people names:
 
  http://tools.ietf.org/html/draft-deng-call-chinese-names-00
 
 http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00
 
  I would like to thank you and your co-author on taking the initiative
  to write the drafts.  I don't know whether I am western or not. :-)
 
  In Section 3 of draft-deng-call-chinese-names-00:
 
'Two generic titles that have similar meanings to Mr. and
 Ms./Mrs. are Xian1sheng1 and Nv3Shi4.'
 
(1,2,3,4 in this section will be explained in next section)
 
  There are digits in two words in the above.  I suggest making the
  comment about the numbers clearer by mentioning that the digits are
  intentional and they are used to denote the tone.
 
  Regards,
  S. Moonesamy




Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
will mention this and candidate ways in the next version.
thanks,

-Hui


2013/7/11 Simon Perreault simon.perrea...@viagenie.ca

 Le 2013-07-11 02:04, Hui Deng a écrit :
  We submitted two drafts to help people here to correctly call chinese
  people names:
 
  http://tools.ietf.org/html/draft-deng-call-chinese-names-00
 http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00

 Very cool! Thanks for writing this!

 I have a question: I think I've seen Chinese names written in both
 orders. That is, sometimes Hui Deng will be written Deng Hui. Am I
 right? Does this happen often? What is the most common order? Is there a
 way to guess what order a name is written in? Sometimes it's not easy
 for non-Sinophones to know which part is the given name and which part
 is the family name.

 Thanks,
 Simon



Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
revised to for english speaking people who care
thanks

-Hui


2013/7/11 Ted Lemon ted.le...@nominum.com

 On Jul 11, 2013, at 8:14 AM, Hui Deng denghu...@gmail.com wrote:
  I personally feel that this is maybe one of not easier part for western
 people to do in today IETF.  and chinese's names sound maybe more diffcult
 than other eastern languages.

 I think these documents are useful for IETFers who care, and possibly for
 others.   Pinyin transliteration is not safely pronounceable without help.
   It's true that many European languages are hard for speakers of other
 languages to pronounce also, and I would not personally object to more
 helpful documents of this type for other languages.   I think that what
 would motivate this would be author interest—that's what we usually let
 drive volunteer translations of IETF messages into other languages, for
 example.   E.g., there are numerous translations for the Tao; these are
 done on a volunteer basis, so if you don't see one for your language, and
 this bothers you, the onus is on you to solve it.





Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
Right, it seems most email addresses are the correct order as far as my
email

deng...@chinamobile.com
denghu...@gmail.com
denghu...@hotmail.com

-Hui


2013/7/11 Ted Lemon ted.le...@nominum.com

 On Jul 11, 2013, at 9:58 AM, Simon Perreault simon.perrea...@viagenie.ca
 wrote:
  Is there a
  way to guess what order a name is written in? Sometimes it's not easy
  for non-Sinophones to know which part is the given name and which part
  is the family name.

 It's usually in the Chinese order in the email address.




Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
Hi Stephen,

all caps should be included, thanks for your pointint out.

for your 85% is one syllable, I guess that normally has two characters for
family name, then they will have two syllables?

thanks,

-Hui



2013/7/11 Stephen Sprunk step...@sprunk.org

  On 11-Jul-13 08:58, Simon Perreault wrote:
  I have a question: I think I've seen Chinese names written in both
  orders. That is, sometimes Hui Deng will be written Deng Hui. Am
  I right? Does this happen often? What is the most common order? Is
  there a way to guess what order a name is written in? Sometimes it's
  not easy for non-Sinophones to know which part is the given name and
  which part is the family name.

 It is more common for the given name to come first when written in Pinyin,
 following the rule for other languages written in Latin characters, but
 exceptions are frequent enough that one can't rely on it.  A useful and
 growing convention is to write the family name in all caps.  Using the
 above example, if Deng were the family name, you might see:

 Hui DENG
 or
 DENG Hui

 whereas if Hui were the family name, you might see:

 Deng HUI
 or
 HUI Deng

 Also, most family names have a single syllable; all of the top 100 are,
 which accounts for 85% of the population of China.  So, if exactly one of
 the names has multiple syllables, it is reasonably safe to assume that is
 the given name, absent a more definitive clue.

 S

 --
 Stephen Sprunk God does not play dice.  --Albert Einstein
 CCIE #3723 God is an inveterate gambler, and He throws the
 K5SSSdice at every possible opportunity. --Stephen Hawking



Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
I guess XML draft doesn't support Lǎobǎn
thanks for your remindness.

-Hui

2013/7/11 Stephen Sprunk step...@sprunk.org

  On 10-Jul-13 19:04, Hui Deng wrote:

 We submitted two drafts to help people here to correctly call chinese
 people names:

 http://tools.ietf.org/html/draft-deng-call-chinese-names-00

http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00


 While first name and last name may be useful for many Western readers,
 they tend to produce confusing statements like put his/her Last name
 first, and first name last.  I would prefer the order-neutral terms given
 name and family name, which results in the more sensible put his/her
 family name first and given name last.

 Also, the section on tones (which BTW belongs in the pronunciation
 document, not the names document) is a good example of how allowing UTF-8,
 rather than just US-ASCII, would be useful.  Lao3ban3 (Wade-Giles)
 requires memorizing what the various tone numbers mean, whereas Lǎobǎn
 (Pinyin) provides a visual representation of the proper tone, which will be
 more accessible to most readers.


 S

 --
 Stephen Sprunk God does not play dice.  --Albert Einstein
 CCIE #3723 God is an inveterate gambler, and He throws the
 K5SSSdice at every possible opportunity. --Stephen Hawking




Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
Hi Ted,

I did explain them in the 1st paragraph about minorities (not mentioned
that they could have two kids in mainland)
anyway, I will revise the title by adding Chinese Han people, hope that
will be ok

-Hui


2013/7/11 Ted Hardie ted.i...@gmail.com

 Howdy,

 Thanks for your efforts.  I would suggest, however, that you re-title your
 drafts so that Chinese is restricted to the populations which use pinyin
 and have standardized on what English speakers call Mandarin (���Z
 or 普通��, depending on your background).  Those who use  romanizations based
 on other dialects, in line with their familial pronunciation, would
 otherwise be treated as not Chinese.

 regards,

 Ted Hardie


 On Wed, Jul 10, 2013 at 5:04 PM, Hui Deng denghu...@gmail.com wrote:

 Hello all

 We submitted two drafts to help people here to correctly call chinese
 people names:

 http://tools.ietf.org/html/draft-deng-call-chinese-names-00

http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00



 Feel free to let us know if you have any other issues?

 Best regards,



 -Hui Deng





Re: Regarding call Chinese names

2013-07-14 Thread Hui Deng
I guess that George is your given name. Wes is your family name. Hope I am
not wrong.:)

-Hui


2013/7/11 George, Wes wesley.geo...@twcable.com

  From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of
  Melinda Shore

  I agree
  that this is probably not appropriate for publication as an RFC
  but it would certainly be useful to find someplace for it in the
  wiki.  The chairs wiki might be an option but I think it's of
  broader interest and use.
 
  Melinda

 [WEG] I think writing language documentation isn't really a good use of
 IETF resources, even at an individual level, because neither the problem
 nor the knowledge necessary to address it is specific to the IETF, nor is
 the problem limited to Mandarin participants. As others have noted, this is
 just one of many languages represented by IETFers that we'd have to treat
 similarly.
 Further, an I-D is not a particularly useful format in which to present
 the info. Raw text in the form of $phoneme as in $English_word may not
 always be helpful, especially to nonnative English speakers who now have to
 work through two layers of pronunciation.  Being able to click on a button
 to hear sample pronunciations, especially in the case of words where tones
 matter, is very helpful.

 So if pronunciation guides end up in the Wiki or the Tao or some other yet
 to be written Diversity and Cultural guide hosted within IETF, I think it's
 more useful to simply reference things already extant instead of generating
 our own. Those representing the language in question could certainly help
 us to source and vet the information, but that's much quicker and more
 efficient than writing it themselves.
 Protocol reuse, hurray! :-)
 e.g.

 http://mandarin.about.com/od/pronunciation/a/How-To-Pronounce-Mandarin-Chinese.htm
 http://en.wikibooks.org/wiki/Japanese/Pronunciation
 http://en.wikipedia.org/wiki/Swedish_phonology

 To be clear, I'm not saying that this doesn't expose a real problem, and
 the draft certainly drew attention to it, but I also don't think that more
 documentation will solve it, especially since the information is already
 readily available in more accessible formats. I think what you'll find is
 that there are two types of folks (in IETF and generally) - those who see
 an attempt at proper pronunciation and cultural awareness as important and
 worth making extra effort to learn proactively, and those who believe that
 if it's an issue, the person on the receiving end will correct them when
 they get it wrong (and hopefully not repeat the mistake).
 Not making a value judgment on either, merely an observation.

 Thanks
 Wes George

 PS: guess which one is my given name and which my surname? Even native
 English speakers aren't immune from name confusion. :-)


 Anything below this line has been added by my company's mail server, I
 have no control over it.
 -

 This E-mail and any of its attachments may contain Time Warner Cable
 proprietary information, which is privileged, confidential, or subject to
 copyright belonging to Time Warner Cable. This E-mail is intended solely
 for the use of the individual or entity to which it is addressed. If you
 are not the intended recipient of this E-mail, you are hereby notified that
 any dissemination, distribution, copying, or action taken in relation to
 the contents of and attachments to this E-mail is strictly prohibited and
 may be unlawful. If you have received this E-mail in error, please notify
 the sender immediately and permanently delete the original and any copy of
 this E-mail and any printout.



Re: Regarding call Chinese names

2013-07-11 Thread Hui Deng
Hi S. Moonesamy,

Thanks a lot, we will add that explaination you suggested in the next
version.

Best regards,

-Hui


2013/7/11 S Moonesamy sm+i...@elandsys.com

 Hi Deng Hui,

 At 17:04 10-07-2013, Hui Deng wrote:

 We submitted two drafts to help people here to correctly call chinese
 people names:

 http://tools.ietf.org/html/**draft-deng-call-chinese-names-**00http://tools.ietf.org/html/draft-deng-call-chinese-names-00


 http://tools.ietf.org/html/**draft-zcao-chinese-pronounce-**00http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00


 I would like to thank you and your co-author on taking the initiative to
 write the drafts.  I don't know whether I am western or not. :-)

 In Section 3 of draft-deng-call-chinese-names-**00:

   'Two generic titles that have similar meanings to Mr. and
Ms./Mrs. are Xian1sheng1 and Nv3Shi4.'

   (1,2,3,4 in this section will be explained in next section)

 There are digits in two words in the above.  I suggest making the comment
 about the numbers clearer by mentioning that the digits are intentional and
 they are used to denote the tone.

 Regards,
 S. Moonesamy



Re: Regarding call Chinese names

2013-07-11 Thread Hui Deng
Good catch, thansk a lot

-Hui


2013/7/11 Will Liu (Shucheng) liushuch...@huawei.com

  A typo in draft-deng-call-chinese-names-00: “Jiao4shao4” should be “
 Jiao4shou4”.

 ** **

 Cheers,

 Shucheng LIU (Will)

 ** **

 *From:* ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] *On Behalf
 Of *Hui Deng
 *Sent:* Thursday, July 11, 2013 8:05 AM
 *To:* IETF Discussion
 *Subject:* Regarding call Chinese names

 ** **

 Hello all

  

 We submitted two drafts to help people here to correctly call chinese
 people names:

 http://tools.ietf.org/html/draft-deng-call-chinese-names-00 

http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00

  

 Feel free to let us know if you have any other issues?

 Best regards,

  

 -Hui Deng



Re: Regarding call Chinese names

2013-07-11 Thread Hui Deng
Hi Mikael,

I will change informational to no-purpose, not require IETF to publish it.
what we do is just want to help people who would like to follow it.

I personally feel that this is maybe one of not easier part for western
people to do in today IETF.  and chinese's names sound maybe more diffcult
than other eastern languages.

Best regards,

-Hui



2013/7/11 Mikael Abrahamsson swm...@swm.pp.se

 On Thu, 11 Jul 2013, Zhongxin (Victor) wrote:

  BRAVO, techies not speaking Chinese would no longer mispronounce “Huawei”
 as the name of some U.S state.


 I have asked Huawei staff how it's pronounced and I think I get it fairly
 right. People who hasn't, might get confused because when I use that
 pronounciation it's not the prevelant pronounciation. About your example,
 there are plenty of places in the US with french origins, and in US
 english, these are pronounced differently than in french. What's correct?
 Perhaps if Huawei would call itself Whow-wei in latin characters more
 people would get it right, if this is a really sensitive issue.

 Linux has similar issue, Linus Torvalds native language is swedish, but
 he's also a native finnish speaker:

 http://danielmiessler.com/**blog/dont-ever-argue-again-**
 about-the-pronunciation-of-**linuxhttp://danielmiessler.com/blog/dont-ever-argue-again-about-the-pronunciation-of-linux
 

 How many english speakers pronounce Linux correctly? Linus' first name? In
 what language? Do native chinese get it right? Is it really worth spending
 time debating it? My name is pronounced differently in english and in
 swedish, just like Linus' name is. I don't get upset when people get it
 wrong. Btw, it's pronounced Mii-ka-el in swedish (where the ii is a long
 version of the initial sound in industry).

 So while I read with interest the documents presented in the original post
 in this thread, I don't expect to understand and remember all of what's in
 them.

 Are these documents intended to be published as informational RFCs (it
 says intended status: informational)? Are we intending to have one for
 each 'major' language in the world? Where is the cutoff for 'major' status
 of a language?

 Should the IETF really publish documents about human languages that
 doesn't really have anything to do with Internet Engineering?

 --
 Mikael Abrahamssonemail: swm...@swm.pp.se


Excuse me for not able to reply shortly

2013-07-11 Thread Hui Deng
Hi all

I am still in the vocation this two weeks out of Beijing with family, quite
diffcult to response in time,  will try to update the drafts before the
deadline. Cao Zhen will help to reply some of the suggestions.

By the way,
surname is Deng
given name is Hui

Thank you all for the disucssion

I really don't know whether IETF should recommend Deng Hui or Hui Deng

anyway,

Best regards,

Deng Hui


Regarding call Chinese names

2013-07-10 Thread Hui Deng
Hello all

We submitted two drafts to help people here to correctly call chinese
people names:

http://tools.ietf.org/html/draft-deng-call-chinese-names-00

   http://tools.ietf.org/html/draft-zcao-chinese-pronounce-00



Feel free to let us know if you have any other issues?

Best regards,



-Hui Deng


OMA IETF MIF API Workshop - Room info

2012-03-26 Thread Hui Deng
OMA IETF MIF API Workshop

Time: Tuesday: 18:10-20:00
Location: room 212/213

1) Program
1.1) OMA OpenCMAPI activity (Thierry Berisot, OMA)
1.2) IETF MIF API Design (Ted Lemon, IETF)
1.3) IETF API related consideration (TBD)
1.4) OMA API Program (Liliana Dinale, OMA)
1.5) Vendor's today implementation (Maybe)
1.6) Next step between IETF and OMA (Thierry, Margaret, and Hui)

2) Purpose
2.1) From IETF, this workshop would help to explain the API related topic,
and clarify what is recommended and not recommended to do and standardized,
if possible, either publish a information document or adding word into the
current MIF api draft about how to use those MIF API for Internet developer.
and some current practices information how today smart terminal is doing.

2.2) From OMA perspective, to socialize OMA’s published specifications and
current ongoing standards activities in the area of APIs. To make sure that
the standards landscape for APIs is coordinated and harmonized. To solicit
feedback about OMA’s specification for Authorization4APIs, which is built
on IETF OAuth as well as OpenCMAPI.

3) Outcomes:
3.1) Future work about how to use those MIF API in an IETF information
 document or inside current MIF API documentfor Internet developers.

3.2) Outcomes OMA: Improved understanding of each others’ activities,
 and a coordinated approach going forward

3.3) Better mutual understanding of the work of both organizations,
 and how to cooperate in the future.


OMA IETF MIF API Workshop

2012-03-21 Thread Hui Deng
OMA IETF MIF API Workshop

Time: Tuesday: 18:10-20:00
Location: TBD

1) Program
1.1) OMA OpenCMAPI activity (Thierry)
1.2) IETF MIF API Design (Ted Lemon)
1.3) IETF API related work (TBD)
1.4) OMA API Program (OMA Member)
1.5) Vendor's today implementation (Maybe)
1.6) Next step between IETF and OMA (Thierry and Hui)

2) Purpose
2.1) From IETF, this workshop would help to explain the API related topic,
and clarify what is recommended and not recommended to do and standardized,
if possible, either publish a information document or adding word into the
current MIF api draft about how to use those MIF API for Internet developer.
and some current practices information how today smart terminal is doing.

2.2) From OMA perspective, to socialize OMA’s published specifications and
current ongoing standards activities in the area of APIs. To make sure that
the standards landscape for APIs is coordinated and harmonized. To solicit
feedback about OMA’s specification for Authorization4APIs, which is built
on IETF OAuth as well as OpenCMAPI.

3) Outcomes:
3.1) Future work about how to use those MIF API in an IETF information
 document or inside current MIF API documentfor Internet developers.

3.2) Outcomes OMA: Improved understanding of each others’ activities,
 and a coordinated approach going forward

3.3) Better mutual understanding of the work of both organizations,
 and how to cooperate in the future.


Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-29 Thread Hui Deng
 Best is no ALG.  Worse is one ALG.  Even worse is two ALGs.

 -d

OK, I have see that there is two solutions for just one ALG.

-Hui
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-29 Thread Hui Deng
inline please,

 +1 ... since the alternative is that apps that require ipv4 sockets and
 pass ipv4 literals are stranded on ipv6 only networks.

 Running code on the n900 shows that nat464 provides real user and
 network benefit

 Can you run an FTP server on the BIH host, and have it do active mode
 transfers and passive mode transfers?  I admit that isn't terribly
 important (nobody much loves FTP any more), but if the BIH host
 doesn't know its public mapping and can't create one, we lose that
 class of applications that listen on a port.  Losing that class
 of applications may, or may not, be important.  Many of those
 applications do STUN or STUN-/ICE-like things for their own NAT
 traversal (e.g., Skype).  But some don't and work properly
 without a hole punched (e.g., BitTorrent).

 PCP can make all of this work, if it's integrated into BIH and
 the NAT64.

 -d


You are jumping into another discussion how to reach from outside,
There has other way to do it ,not just BIH+NAT64.

Hui
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-28 Thread Hui Deng
Hi Dan,

Inline please,

2011/9/27 Dan Wing dw...@cisco.com

  -Original Message-
  From: Hui Deng [mailto:denghu...@gmail.com]
  Sent: Monday, September 26, 2011 11:01 PM
  To: Dan Wing
  Cc: teemu.savolai...@nokia.com; satoru.matsush...@gmail.com;
  ietf@ietf.org; softwi...@ietf.org; beh...@ietf.org
  Subject: Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
  (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
 
  Hi Dan
 
  inline please,
 
 
I believe the objection is against non-deterministic
  translation,
rather than stateful versus stateless.  By non-deterministic, I
  mean
that the subscriber's equipment (e.g., CPE) cannot determine the
mapping it will have on the Internet.  A+P mechanisms are
 
 
  Could you help be more elaboration on CPE can't determine the ampping?

 It can't determine the public IP address and port of a mapping on the
 NAT64 (CGN), and it can't create a mapping on the NAT64 (CGN) -- because
 the CGN is going to make a dynamic mapping when it sees a UDP, TCP,
 or ICMP packet from the subscriber.

I don't see it matters



deterministic (including 4rd, Dual-IVI, and draft-ymbk-aplus-p).
 
 
  By the way, I would say you are missing one early draft:
  http://tools.ietf.org/html/draft-murakami-softwire-4v6-translation-00
  which is align with 4rd  about 4v6 translation which has been
  contributed by major operators which is also align with NAT64
  deployment.

 Sorry.

 -d


  -Hui
 
 
 
 
A stateful CGN, as commonly deployed, is not deterministic.
 
However -- and this is my point in this email -- a stateful CGN
can be configured and deployed so that it deterministically maps
traffic.  That is, it can function very much like A+P/4rd/Dual-
  IVI
so that port N from subscriber A is always mapped to public
port Z on IPv4 address Y.  We could have the CPE know about
that fixed mapping using the same DHCP options that A+P/4rd/
Dual-IVI would use, or use PCP, or use some other protocol.
 
-d
 
 
 I would assume softwires follows these same IETF guidelines and
 therefore is
 now focusing solely on stateless approaches(?). If the IETF
  opinion has
 changed so that also stateful double translation solutions are
  now ok
 for
 IETF, then that should perhaps be reflected in this document as
  well.

 Unfortunately, I did not have chance to go to softwires
  interim, but
 please
 let us know if the discussions there impact also the quoted
 recommendation.

 Best regards,

   Teemu

  -Original Message-
  From: behave-boun...@ietf.org [mailto:behave-
  boun...@ietf.org] On
  Behalf Of ext Satoru Matsushima
  Sent: 13. syyskuuta 2011 06:51
  To: ietf@ietf.org
  Cc: beh...@ietf.org; Satoru Matsushima
  Subject: Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-
  06.txt
 (Dual
  Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed
  Standard
 
  The introduction in the draft says:
 
 
 IETF recommends using dual-stack or tunneling based
  solutions for
  IPv6 transition and specifically recommends against
  deployments
  utilizing double protocol translation.  Use of BIH
  together with
 a
  NAT64 is NOT RECOMMENDED [RFC6180].
  
 
 
  This statement makes a strong obstacle when we develop
  stateless
 solution
  with translation in softwires wg.
  I think that it is still remained a room to make decision
  whether
 removing
 the
  statement or remaining it.
  The discussion which we'll have in the softwires interim
  meeting
 would be
  helpful to decide it.
 
  Best regards,
  --satoru
 
 
 
  On 2011/08/31, at 22:53, The IESG wrote:
 
  
   The IESG has received a request from the Behavior
  Engineering for
   Hindrance Avoidance WG (behave) to consider the following
  document:
   - 'Dual Stack Hosts Using Bump-in-the-Host (BIH)'
draft-ietf-behave-v4v6-bih-06.txt as a Proposed Standard
  
   The IESG plans to make a decision in the next few weeks,
  and
 solicits
   final comments on this action. Please send substantive
  comments to
 the
   ietf@ietf.org mailing lists by 2011-09-14. Exceptionally,
  comments
 may
   be sent to i...@ietf.org instead. In either case, please
  retain the
   beginning of the Subject line to allow automated sorting.
  
   Abstract
  
  
 Bump-In-the-Host (BIH) is a host-based IPv4 to IPv6

Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-28 Thread Hui Deng
inline please,

2011/9/27 Dan Wing dw...@cisco.com

  -Original Message-
  From: teemu.savolai...@nokia.com [mailto:teemu.savolai...@nokia.com]
  Sent: Monday, September 26, 2011 11:14 PM
  To: dw...@cisco.com; satoru.matsush...@gmail.com; ietf@ietf.org
  Cc: softwi...@ietf.org; beh...@ietf.org
  Subject: RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
  (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
 
   I believe the objection is against non-deterministic translation,
  rather
  than
   stateful versus stateless.  By non-deterministic, I mean that the
  subscriber's
   equipment (e.g., CPE) cannot determine the mapping it will have on
  the
   Internet.  A+P mechanisms are deterministic (including 4rd, Dual-IVI,
  and
   draft-ymbk-aplus-p).
  
   A stateful CGN, as commonly deployed, is not deterministic.
 
  I don't understand why that is significant enough factor for IETF to
  (not)
  recommend some double translation variants. I mean does existing
  applications work better if double translation is done in deterministic
  manner?

 Yes, it allows the CPE to implement an ALG -- if an application needs
 an ALG (e.g., active-mode FTP).


Are you saying distrbiuted ALG is much better than centralized ALG?

-Hui



 -d

  One reasoning against double translation has been that it
  breaks
  some class of applications. Is it now so that some forms of double
  translation do not break applications while some others do?
 
Teemu
 

  ___
 Behave mailing list
 beh...@ietf.org
 https://www.ietf.org/mailman/listinfo/behave

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-27 Thread Hui Deng
Hi Dan

inline please,


 I believe the objection is against non-deterministic translation,
 rather than stateful versus stateless.  By non-deterministic, I mean
 that the subscriber's equipment (e.g., CPE) cannot determine the
 mapping it will have on the Internet.  A+P mechanisms are

 Could you help be more elaboration on CPE can't determine the ampping?


 deterministic (including 4rd, Dual-IVI, and draft-ymbk-aplus-p).

By the way, I would say you are missing one early draft:
http://tools.ietf.org/html/draft-murakami-softwire-4v6-translation-00
which is align with 4rd  about 4v6 translation which has been contributed by
major operators which is also align with NAT64 deployment.

-Hui




 A stateful CGN, as commonly deployed, is not deterministic.

 However -- and this is my point in this email -- a stateful CGN
 can be configured and deployed so that it deterministically maps
 traffic.  That is, it can function very much like A+P/4rd/Dual-IVI
 so that port N from subscriber A is always mapped to public
 port Z on IPv4 address Y.  We could have the CPE know about
 that fixed mapping using the same DHCP options that A+P/4rd/
 Dual-IVI would use, or use PCP, or use some other protocol.

 -d

  I would assume softwires follows these same IETF guidelines and
  therefore is
  now focusing solely on stateless approaches(?). If the IETF opinion has
  changed so that also stateful double translation solutions are now ok
  for
  IETF, then that should perhaps be reflected in this document as well.
 
  Unfortunately, I did not have chance to go to softwires interim, but
  please
  let us know if the discussions there impact also the quoted
  recommendation.
 
  Best regards,
 
Teemu
 
   -Original Message-
   From: behave-boun...@ietf.org [mailto:behave-boun...@ietf.org] On
   Behalf Of ext Satoru Matsushima
   Sent: 13. syyskuuta 2011 06:51
   To: ietf@ietf.org
   Cc: beh...@ietf.org; Satoru Matsushima
   Subject: Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
  (Dual
   Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
  
   The introduction in the draft says:
  
  
  IETF recommends using dual-stack or tunneling based solutions for
   IPv6 transition and specifically recommends against deployments
   utilizing double protocol translation.  Use of BIH together with
  a
   NAT64 is NOT RECOMMENDED [RFC6180].
   
  
  
   This statement makes a strong obstacle when we develop stateless
  solution
   with translation in softwires wg.
   I think that it is still remained a room to make decision whether
  removing
  the
   statement or remaining it.
   The discussion which we'll have in the softwires interim meeting
  would be
   helpful to decide it.
  
   Best regards,
   --satoru
  
  
  
   On 2011/08/31, at 22:53, The IESG wrote:
  
   
The IESG has received a request from the Behavior Engineering for
Hindrance Avoidance WG (behave) to consider the following document:
- 'Dual Stack Hosts Using Bump-in-the-Host (BIH)'
 draft-ietf-behave-v4v6-bih-06.txt as a Proposed Standard
   
The IESG plans to make a decision in the next few weeks, and
  solicits
final comments on this action. Please send substantive comments to
  the
ietf@ietf.org mailing lists by 2011-09-14. Exceptionally, comments
  may
be sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.
   
Abstract
   
   
  Bump-In-the-Host (BIH) is a host-based IPv4 to IPv6 protocol
  translation mechanism that allows a class of IPv4-only
  applications
  that work through NATs to communicate with IPv6-only peers.  The
  host
  on which applications are running may be connected to IPv6-only
  or
  dual-stack access networks.  BIH hides IPv6 and makes the IPv4-
  only
  applications think they are talking with IPv4 peers by local
  synthesis of IPv4 addresses.  This draft obsoletes RFC 2767 and
  RFC
  3338.
   
   
   
   
The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/
   
IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/
   
   
No IPR declarations have been submitted directly on this I-D.
   
   
___
Behave mailing list
beh...@ietf.org
https://www.ietf.org/mailman/listinfo/behave
  
   ___
   Behave mailing list
   beh...@ietf.org
   https://www.ietf.org/mailman/listinfo/behave

 ___
 Behave mailing list
 beh...@ietf.org
 https://www.ietf.org/mailman/listinfo/behave

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [BEHAVE] [Softwires] Last Call:draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts UsingBump-in-the-Host (BIH)) to Proposed Standard

2011-09-26 Thread Hui Deng
May I know what's the reason to against stateful other than stateless?

-Hui

2011/9/26 Rajiv Asati (rajiva) raj...@cisco.com


  tunneling). It may be that the recommendation is specifically against
  *stateful* double translation

 That may be reasonable. And the document may reflect that.


  IETF recommends using dual-stack or tunneling based solutions
 for
   IPv6 transition and specifically recommends against deployments
   utilizing double protocol translation.  Use of BIH together
 with a
   NAT64 is NOT RECOMMENDED [RFC6180].

 One could suggest rephrasing that para with something like this -

 This document doesn't recommend using BIH together with NAT64
  [RFC6180]. Of course, the adoption of this or any solution (e.g
  dual-stack and/or any solution that eases the path to IPv6
 (and accommodate residual IPv4)) would be subjected to the
 overall cost-effectiveness, as determined by operators per their
 environments/constraints.

 Cheers,
 Rajiv


  -Original Message-
  From: softwires-boun...@ietf.org [mailto:softwires-boun...@ietf.org]
 On Behalf
  Of teemu.savolai...@nokia.com
  Sent: Monday, September 26, 2011 11:20 AM
  To: satoru.matsush...@gmail.com; ietf@ietf.org
  Cc: softwi...@ietf.org; beh...@ietf.org
  Subject: Re: [Softwires] [BEHAVE] Last
  Call:draft-ietf-behave-v4v6-bih-
  06.txt (Dual Stack Hosts UsingBump-in-the-Host (BIH)) to Proposed
 Standard
 
  Please note that this statement was included after quite long and
 heated
  discussion in behave WG and because it came clear that IETF
 recommendation
  is against double protocol translation (in favor of dual-stack and
  tunneling). It may be that the recommendation is specifically against
  *stateful* double translation (although that was not said aloud, if I
 recall
  correctly).
 
  I would assume softwires follows these same IETF guidelines and
 therefore is
  now focusing solely on stateless approaches(?). If the IETF opinion
 has
  changed so that also stateful double translation solutions are now ok
 for
  IETF, then that should perhaps be reflected in this document as well.
 
  Unfortunately, I did not have chance to go to softwires interim, but
 please
  let us know if the discussions there impact also the quoted
 recommendation.
 
  Best regards,
 
Teemu
 
   -Original Message-
   From: behave-boun...@ietf.org [mailto:behave-boun...@ietf.org] On
   Behalf Of ext Satoru Matsushima
   Sent: 13. syyskuuta 2011 06:51
   To: ietf@ietf.org
   Cc: beh...@ietf.org; Satoru Matsushima
   Subject: Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
 (Dual
   Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
  
   The introduction in the draft says:
  
  
  IETF recommends using dual-stack or tunneling based solutions
 for
   IPv6 transition and specifically recommends against deployments
   utilizing double protocol translation.  Use of BIH together
 with a
   NAT64 is NOT RECOMMENDED [RFC6180].
   
  
  
   This statement makes a strong obstacle when we develop stateless
 solution
   with translation in softwires wg.
   I think that it is still remained a room to make decision whether
 removing
  the
   statement or remaining it.
   The discussion which we'll have in the softwires interim meeting
 would be
   helpful to decide it.
  
   Best regards,
   --satoru
  
  
  
   On 2011/08/31, at 22:53, The IESG wrote:
  
   
The IESG has received a request from the Behavior Engineering for
Hindrance Avoidance WG (behave) to consider the following
 document:
- 'Dual Stack Hosts Using Bump-in-the-Host (BIH)'
 draft-ietf-behave-v4v6-bih-06.txt as a Proposed Standard
   
The IESG plans to make a decision in the next few weeks, and
 solicits
final comments on this action. Please send substantive comments to
 the
ietf@ietf.org mailing lists by 2011-09-14. Exceptionally, comments
 may
be sent to i...@ietf.org instead. In either case, please retain
 the
beginning of the Subject line to allow automated sorting.
   
Abstract
   
   
  Bump-In-the-Host (BIH) is a host-based IPv4 to IPv6 protocol
  translation mechanism that allows a class of IPv4-only
 applications
  that work through NATs to communicate with IPv6-only peers.  The
 host
  on which applications are running may be connected to IPv6-only
 or
  dual-stack access networks.  BIH hides IPv6 and makes the
 IPv4-only
  applications think they are talking with IPv4 peers by local
  synthesis of IPv4 addresses.  This draft obsoletes RFC 2767 and
 RFC
  3338.
   
   
   
   
The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/
   
IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/
   
   
No IPR declarations have been submitted directly on this I-D.
   
   
___
Behave mailing list

Re: Beijing hotel Nikko close to Shangri-La?

2010-10-26 Thread Hui Deng
could anyone copy the map to me ? this website is not reachable for me.
I have been there several days before,
the direct road is only for bike,
I have observed there for a while and  it seems nobody walking beside the
major road.

For pedestian, you may have to cross several over-road bridges which
have stairs up and down. then you could get to shangri-la hotel finally.

-Hui

2010/10/26 Huub van Helvoort hhelvo...@huawei.com

 Hi Alex,

 You wrote:

  Thank you for guidance, I've put Shangri-La and Nikko on a google map:
 
 http://ow.ly/2ZpEh
 
  I hope they're correct.

 They are correct if you pick the plan view the satelite view
 has a horizontal offset of about 500 meters.

 Regards, Huub.


 --
 
 Always remember that you are unique...just like everyone else...
  ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: cell sim card recommendations

2010-10-26 Thread Hui Deng
Yes, you could only get sim card other than rent a a new phone.

let me try to classify 3 operators
1) China Mobile: 2G: GSM/GPRS/EDGE, 3G: TDSCDMA
2) China Unicom: 2G: GSM/GPRS/EDGE, 3G:WCDMA
3) China Telcom: 2G: CDMA, 3G:CDMA 2000 1XEVDO

If you would like to get 3G capability, I would recommend to use China
Unicom.
but anyway, China Mobile has the best coverage nation wide.

For buying a sim card inside the downtown, it must be very cheaper,
Normally in Beijing, you could buy prepaid sim card say 100RMB,
the cost will be 0.5 rmb per minutes, it will differently from each
opeartors.
you may easily found them in newspaper selling both which should be very
near the hotel.
it may cost 50RMB, I have no idea.

-Hui
2010/10/27 Dave CROCKER d...@dcrocker.net

 Nihao,

 The Beijing event info includes a reference to getting a sim card at the
 airport:

   http://www.ietf79.cn/show.php?contentid=46

 Some references I've seen elsewhere on the net suggest perhaps getting a
 China Mobile card in town at a store.  (For example, much cheaper.)

 What none of these provide is enough detail to know what specific services
 will come with the card and at what price.  Predictably, I'm particularly
 interested in 3G data mode.

 (Life in Barcelona was made vastly more comfortable by a second-tier
 provider's 100MB/day service at 3 EU/day.  I'm hoping there is a similar
 option in Beijing that is convenient to obtain.)

 Suggestions?

 d/
 --

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Local Beijing people response - RE: Request for community guidance on issue concerning a future meeting of the IETF

2009-10-02 Thread Hui Deng
Dave,

Thanks for your clarification, now I understand this has converged to
a more contract language issue.
At this stage, I may not be able to help on the detail languages since
I guess the hoster or IAOC already
have been deeply involved in it.

Anyhow, I apprecaite that you make everybody more clear on it, thanks.
Lastly, I think that everybody have to self-censor about what he does.

Thanks for the discussion

-Hui

2009/10/2 Dave CROCKER d...@dcrocker.net:
 Hui,

 Hui Deng wrote:

 1) I personally have attended several standardization meetings such as
 3GPP and 3GPP2 in China,

 Many of us have attended meetings in China and we have found them productive
 and enjoyable.  However all of those other groups conduct their business in
 a way that is significantly different from the unruly style of the IETF.

  3) IETF is doing technical stuff, I don't see why we need to be involved
 in political stuff.

 This has been explained repeatedly.  First, there is legitimate technical
 work in the IETF that touches topics which are explicitly prohibited by the
 contract language.  Second, the style of IETF discussions often includes
 individual comments which are likely to violate the contract.  This unruly
 speech is a consequence of a core principle in the open style of IETF work.


 4) China is one of the major member of United Nations, anyhow, come here
 and see

 Hui, this really has little to do with China.

 Rather, the problem is with contract language that I believe we would never
 accept for any other venue.

        The only reason we have a debate about this because
        we are so /eager/ to have an IETF meeting in China!

 Some folk say that we should ignore the language in the draft contract,
 because it will not be enforced, except under extreme circumstances.  First,
 it is never appropriate for people signing a contract to assume that it
 won't be enforced, especially when they cannot really know the exact
 conditions that will cause it to be enforced.  (The term fiduciary
 responsibility covers this.) Second, these assurances are coming from
 people who cannot speak for the hotel or the government.  Hence, they are
 merely guessing.

 Let's be specific:

   Should the contents of the Group's activities, visual or audio
   presentations at the conference,or printed materials used at the
   conference (which are within the control of the Client) contain

 Note how extensive this is.  We are required to control material and speech
 by everyone, yet the IETF has never really controlled the material or speech
 of /anyone/.


   any defamation against the Government of the People's Republic

 Defamation is really a rather vague word, especially among most of us do not
 know how it is actually used in China.  (Let's be fair.  I suspect most of
 us do not know how it is used as a legal term in the US, or any other
 country...)
 So we need to be afraid of violating this, without really knowing what is
 permitted and what is prohibited.


   of China, or show any disrespect to the Chinese culture, or

 Disrespect is an even more vague term and it is coupled with culture which
 could mean anything having to do with the country's government, history or
 population, and could even cover reference to Chinese people anywhere in the
 world.

 Worse, comments made in the IETF are often disrespectful.  We wish they
 weren't, but again, this is a consequence of how the IETF conducts its
 business.  So the IETF really is being required to make guarantees that
 change its basic style of operation.


   violates any laws of the People's Republic of China or feature

 Language that says that we won't violate the host country's laws is, of
 course, not necessary -- the laws are the laws and anyone violating them has
 a problem, no matter whether it is referenced in the contract -- but it
 probably doesn't hurt to include it.  Or rather, the only reason to include
 it is to set the stage for the financial consequences, specified later...


   any topics regarding human rights or religion without prior
   approval from the Government of the People's Republic of China,

 As has been noted by several folks, the IETF does work that necessarily
 requires discussing topics that are relevant to human rights.  And again, we
 also have the problem of trying to restrict spontaneous comments that might
 violate these conditions; yet we have never done that.


   the Hotel reserves the right to terminate the event on the spot
   and/or ask the person(s) who initiates or participates in any or
   all of the above action to leave the hotel premises immediately.

 This gives the Hotel complete freedom to shut the meeting down according to
 its own interpretation of conditions that are extremely vague.  That's not a
 reasonable contract condition for us to agree to.  (Here's where fiduciary
 responsibility becomes the real focus, when making an agreement.)


   The Client will support and assist the Hotel with the necessary

RE: Request for community guidance on issue concerning a future meeting of the IETF

2009-09-30 Thread Hui Deng

Does this survey still work?, 

I failed to do anything over there.

 

-Hui
 
 From: t...@americafree.tv
 To: ietf-annou...@ietf.org; ietf@ietf.org; wgcha...@ietf.org
 Subject: Request for community guidance on issue concerning a future meeting 
 of the IETF
 Date: Fri, 18 Sep 2009 11:42:00 -0400
 CC: i...@ietf.org; irtf-ch...@irtf.org
 
 Greetings;
 
 We have received numerous suggestions and requests for an IETF meeting
 in China and the IAOC has been working on a potential China meeting for
 several years. We are now close to making a decision on a potential
 upcoming meeting in China. However, the following issue has arisen
 and we would appreciate your feedback.
 
 The Chinese government has imposed a rule on all conferences held
 since 2008 regarding political speech. A fundamental law in China
 requires that one not criticize the government. Practically, this
 has reference to public political statements or protest marches, which
 are not the IETF's custom. The government, which is a party to the 
 issue,
 requires that people who attend conferences in China (the IETF being
 but one example) not engage in political speech during their tour
 in China. We consider this to be acceptable, on the basis that the
 IETF intends to abide by the laws of whatever nations it visits and
 we don't believe that this impacts our ability to do technical work.
 
 The rule is implemented in the Hotel agreement and reads (note that
 the Client would be the Host, and the Group would be the IETF) :
 
 Should the contents of the Group's activities, visual or audio
 presentations at the conference,or printed materials used at the
 conference (which are within the control of the Client) contain
 any defamation against the Government of the People's Republic
 of China, or show any disrespect to the Chinese culture, or
 violates any laws of the People's Republic of China or feature
 any topics regarding human rights or religion without prior
 approval from the Government of the People's Republic of China,
 the Hotel reserves the right to terminate the event on the spot
 and/or ask the person(s) who initiates or participates in any or
 all of the above action to leave the hotel premises immediately.
 
 The Client will support and assist the Hotel with the necessary
 actions to handle such situations. Should there be any financial
 loss incurred to the Hotel or damage caused to the Hotel's
 reputation as a result of any or all of the above acts, the Hotel
 will claim compensation from the Client.
 
 What does this condition mean ? The hotel staff would have, in theory,
 the legal right to shut down the meeting and ask the offending
 participants to leave the property immediately. While we do not
 foresee a situation where such action would take place, we feel that
 it is proper to disclose these conditions to the community.
 
 The members of the IAOC, speaking as individuals, do not like this
 condition as a matter of principle. The IAOC does believe that this
 condition would not prevent the IETF from conducting its business.
 
 We note that the Vancouver/Quebec survey conducted earlier this year
 asked for people to suggest venues in Asia; an overwhelming majority
 (94%) of those who mentioned China were in favor of having a meeting
 there.
 
 We are therefore asking for input from the community by two means - by
 commenting on the IETF discussion list, and also by completing a very
 short survey on people's intentions to travel to China, or not,
 subject to these conditions. This survey can be found here :
 
 https://www.surveymonkey.com/s.aspx?sm=h4DUkRUOdG_2bVLqioPcYYHw_3d_3d
 
 All responses received by October 1, 2009 at 9:00 AM EDT (1300 UTC)
 will be considered by the IAOC in making its decision. We appreciate
 the assistance of the community in providing us with data that will
 help us to make an informed decision.
 
 Regards
 Marshall Eubanks
 (acting for the IAOC)
 
  
_
Invite your mail contacts to join your friends list with Windows Live Spaces. 
It's easy!
http://spaces.live.com/spacesapi.aspx?wx_action=createwx_url=/friends.aspxmkt=en-us___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Local Beijing people response - RE: Request for community guidance on issue concerning a future meeting of the IETF

2009-09-30 Thread Hui Deng

excuse me for previous sending wrong email.

 

Hello, all

 

I have to say something before the deadline of this survey.

 

To be honest, I am not the hoster, but live in Beijing, China 

for the long time, and would like to clarify several 

different concerns about China and Beijing.

 

1) I personally have attended several standardization meetings such as

3GPP and 3GPP2 in China, they have been discussed for example lots of security 

or privacy stuff such as in 3GPP SA3, I haven't see any problem.

 

2) Olympic game has been here, most of people think that it was a sucess.

 

3) IETF is doing technical stuff, I don't see why we need to be involved in 
political stuff.

 

4) China is one of the major member of United Nations, anyhow, come here and 
see 

what she really looks like, other than imagine remotely is a better way to do 
it.

 

Thanks for your consideration.

 

-Hui

 

 


 
 From: dean.wil...@softarmor.com
 To: dcroc...@bbiw.net
 Subject: Re: Request for community guidance on issue concerning a future 
 meeting of the IETF
 Date: Tue, 29 Sep 2009 18:09:04 -0500
 CC: i...@ietf.org; wgcha...@ietf.org; ietf@ietf.org
 
 
 On Sep 28, 2009, at 8:07 PM, Dave CROCKER wrote:
 
  Folks,
 
  A number of people have indicated that they believe the draft 
  contract language is standard, and required by the government.
 
  It occurs to me that we should try to obtain copies of the exact 
  language used for meetings by other groups like ours.
 
  If indeed the language is identical, that probably means 
  something useful.
 
  If our draft language is different, that also probably means 
  something useful.
 
  Does anyone have access to copies of agreements for other meetings?
 
 As the IETF's liaison manager to OMA, and a former member of the OMA 
 board of directors, I checked with OMA's management team, providing 
 them the proposed text from our contract. They have held several large 
 meetings as well as smaller interop events in China in the past. 
 Their general manager does not recall having signed anything as 
 unforgiving as the proposed contract, and suggested that we try to 
 negotiate the terms, especially the financial damages clause, and that 
 we attempt to restrict the right to terminate to just the affected 
 session, not the entire multi-working-group IETF meeting. Clearly the 
 government has the power to terminate whatever they want whenever they 
 want, but OMA management seemed to think that the proposed contract 
 was more generous to the venue than government rules might require.
 
 OMA management did caution us to be careful about visas and be 
 prepared for some of our attendees to show up with missing or wrong 
 visas and need help at the time of arrival, and that we may have visa 
 difficulty with attendees from Taiwan. They also had some trouble with 
 equipment in customs, including power supplies and WiFi base stations. 
 Apparently some equipment was disassembled by customs inspectors and 
 required in the field repair with solder and scavenged parts, so we 
 should be prepared to re-assemble things that weren't meant to come 
 apart. Their technical support firm is based in France and ended up 
 shipping some equipment in and out via the French embassy due to 
 transport difficulties.
 
 OMA management did note that they consider their meetings in China to 
 have been very successful, and that they had and expected no 
 difficulty with their technical discussions falling afoul of local 
 regulations. OMA, as has been previously pointed out, has considered 
 DRM specification a central piece of their specification family in the 
 past, and encountered no difficulties talking about DRM in China.
 
 --
 Dean
  
_
More than messages–check out the rest of the Windows Live™.
http://www.microsoft.com/windows/windowslive/___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Request for community guidance on issue concerning a future meeting of the IETF

2009-09-30 Thread Hui Deng
Thanks Ray,
Now I remember that I forget I have done that once already.

that will be fine for me.

Regards,

-Hui

2009/10/1 Ray Pelletier rpellet...@isoc.org:

 On Sep 30, 2009, at 10:41 AM, Hui Deng wrote:

 Does this survey still work?,
 I failed to do anything over there.

 Yes it does.
 What problems did you experience?
 We have had one other complain of Java problems, but he had an old Browser.
 Otherwise 343 have completed the survey successfully.
 Ray


 -Hui

 From: ...@americafree.tv
 To: ietf-annou...@ietf.org; i...@ietf.org; wgcha...@ietf.org
 Subject: Request for community guidance on issue concerning a future
 meeting of the IETF
 Date: Fri, 18 Sep 2009 11:42:00 -0400
 CC: i...@ietf.org; irtf-ch...@irtf.org

 Greetings;

 We have received numerous suggestions and requests for an IETF meeting
 in China and the IAOC has been working on a potential China meeting for
 several years. We are now close to making a decision on a potential
 upcoming meeting in China. However, the following issue has arisen
 and we would appreciate your feedback.

 The Chinese government has imposed a rule on all conferences held
 since 2008 regarding political speech. A fundamental law in China
 requires that one not criticize the government. Practically, this
 has reference to public political statements or pr otest marches, which
 are not the IETF's custom. The government, which is a party to the
 issue,
 requires that people who attend conferences in China (the IETF being
 but one example) not engage in political speech during their tour
 in China. We consider this to be acceptable, on the basis that the
 IETF intends to abide by the laws of whatever nations it visits and
 we don't believe that this impacts our ability to do technical work.

 The rule is implemented in the Hotel agreement and reads (note that
 the Client would be the Host, and the Group would be the IETF) :

 Should the contents of the Group's activities, visual or audio
 presentations at the conference,or printed materials used at the
 conference (which are within the control of the Client) contain
 any defamation against the Government of the People's Republic
 of China, or show any disrespec t to the Chinese culture, or
 violates any laws of the People's Republic of China or feature
 any topics regarding human rights or religion without prior
 approval from the Government of the People's Republic of China,
 the Hotel reserves the right to terminate the event on the spot
 and/or ask the person(s) who initiates or participates in any or
 all of the above action to leave the hotel premises immediately.

 The Client will support and assist the Hotel with the necessary
 actions to handle such situations. Should there be any financial
 loss incurred to the Hotel or damage caused to the Hotel's
 reputation as a result of any or all of the above acts, the Hotel
 will claim compensation from the Client.

 What does this condition mean ? The hotel staff would have, in theory,
 the legal right to shut down the meeting and ask the offending
 participants to lea ve the property immediately. While we do not
 foresee a situation where such action would take place, we feel that
 it is proper to disclose these conditions to the community.

 The members of the IAOC, speaking as individuals, do not like this
 condition as a matter of principle. The IAOC does believe that this
 condition would not prevent the IETF from conducting its business.

 We note that the Vancouver/Quebec survey conducted earlier this year
 asked for people to suggest venues in Asia; an overwhelming majority
 (94%) of those who mentioned China were in favor of having a meeting
 there.

 We are therefore asking for input from the community by two means - by
 commenting on the IETF discussion list, and also by completing a very
 short survey on people's intentions to travel to China, or not,
 subject to these conditions. This survey can be found here :

 https://www.surveymonkey.com/s.aspx?sm=h4DUkRUOdG_2bVLqioPcYYHw_3d_3d

 All responses received by October 1, 2009 at 9:00 AM EDT (1300 UTC)
 will be considered by the IAOC in making its decision. We appreciate
 the assistance of the community in providing us with data that will
 help us to make an informed decision.

 Regards
 Marshall Eubanks
 (acting for the IAOC)


 
 Invite your mail contacts to join your friends list with Windows Live
 Spaces. It's easy! Try it!

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [IPsec] Fwd: Last Call: draft-ietf-ipsecme-ikev2-resumption (IKEv2 Session Resumption) to Proposed Standard

2009-09-22 Thread Hui Deng
Comments inline, thanks

2009/9/3 Tero Kivinen kivi...@iki.fi:
 Yaron Sheffer writes:
 [YS] I see the merits of extending IKE_SA_INIT to support resumption, and in
 fact an early version of our work did exactly that. But the working group
 gave us a clear direction to use a separate exchange, and this is where we
 disagree: I believe we did have a strong WG consensus that the
 implementation benefits of having a separate exchange (i.e. not overloading
 even more the non-trivial IKE_SA_INIT exchange) outweigh the benefits of the
 alternative.

 I agree on that (both to the WG having consensus and also that using
 separate exchange is better).
[Hui] I don't think so. IMO, in the list, the comparison of extended
IKE_SA_INIT exchange and IKE_SESSION_RESUME still did not have a consensus yet.
It was a ballot in the mailing list in the begining, and it is quite
clear more people opposing
sepaparate exchange, we could do one more round ballot if needed.


  I know that how a client detects the need for resumption is out of the
  scope of this draft. But, there is the possibility that IPsec client
  may be continuously deceived and believe the fail of IPsec gateway. It
  may continuously present the ticket and update the ticket. In this
  sense, IMHO, this draft should take care of this case.
 
 [YS] If I understand the scenario correctly, it is similar to an attacker
 repeatedly sending notifications to an IKE client, making it believe that
 the IKE exchange has failed and needs to be reinitiated. This attack against
 plain-vanilla IKE would be much more CPU-intensive to the client and to the
 (real) gateway, compared to repeated session resumption. Even when you
 factor in the cost of generating a new ticket. Moreover, the regular IKEv2
 anti-DOS cookie mechanism is supported by IKE_SESSION_RESUME as well.

 Regardless what notifications or ICMP messages you send to any of the
 IKE end points that MUST NOT cause them to consider IKE SA failed. It
 MUST conclude that the other endpoind has failed only when repeated
 attemtps to contact it have gone unanswered for timeout period or when
 a cryptographically protected INITIAL_CONTACT notification is received
 on a different IKE SA to the same authenticated identity. (RFC 4306
 section 2.4)

 Notifications and ICMP messages may trigger other end to send empty
 INFORMATIONAL message to check whether the other end is alive or not
 and only if that times out then the other end is considered dead.

 This means this kind of attack is not possible with notifications and
 ICMP.

 On the other hand I do agree with Peny that, as resumption draft makes
 it out of scope for this draft, how a client detects the need of
 resumption, we might need more text explaining this attack. I.e. we
 might need to add text to security considerations which says that the
 client implementations should not trust any untrusted source when they
 are trying to detect whether the resumption is needed.

[Hui] I also agree with Peny and Tero. Although way of detecting
failure of gateways is out of the scope of current charter, WG draft
should at least handle the issues incurred by mis-judgement of client.

thanks

-Hui
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] WG Review: Multiple InterFaces (mif)

2009-04-24 Thread Hui Deng
Hi, Ted,

Excuse me for late reply, thanks for the discussion.

The reason why I said before is that currently there are limtied ISP
providing ICE support for open applications, anyhow, P2P made a smart
way to reach it.

For what I know application which need ICE like IMS is normally go to
independent APN.
That could be guaranteed since it is kind of application binding APN.

Today most mobile application binding with APN(kind of interface like)
or could be on-demand select for user. I guess Marc raised similar
consideration which allow application to call such interface API, then
it can run depending on different connection's characteristic.

Please kind help to provide your text regarding this application
scenario, it will be helpful for MIF PS could include those.
I will re-read the spec which you recommend and to know the potential needs.

thanks again

-Hui


2009/4/24 Ted Hardie har...@qualcomm.com:
 At 6:30 AM -0700 4/23/09, Hui Deng wrote:
For what I know at the moment service provider deployment experience,
ICE like solution has been deployed by a dedicate close network, this
is not interact with MIF space we talked here, mif are resolve general issue
with host connections, in that scenario, application is isolated.

thanks.

-Hui.

 Forgive me, Hui, but it is not clear to me whether you think the application
 is isolated in situations where ICE is in use, or whether it is isolated in 
 the
 work for which MIF might be chartered.

 If your point is that not all applications have a signalling-path mechanism
 for trading candidates using SDP, that is certainly true.  What is truly scary
 is that this makes applications which can use ICE better off than the common
 case, despite ICE's complexity.  I hope, after reading the full ICE spec and
 recognizing that there are *still* cases where it does not work to establish
 connectivity, you will see the scope of the problem.

 Interfaces/network attachments may have different reachability characteristics
 (e.g. be part of different address realms or otherwise have substantially
 different access to parts of the network).  There are classes of application
 which will want to make interface choices based on those characteristics.

 There are many other characteristics which may play into interface choices
 (do I already have a data channel on interface X, and need to acquire it on
 interface y?), and I do not want to minimize those, power savings being
 a big deal in my day job choices for this type of thing.  But the
 applications' needs here can't be subordinate to those, or the whole point
 of the link--you know, traffic across it--is lost.

 Just my personal opinion, despite the mention of a day job,
                                regards,
                                        Ted


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] WG Review: Multiple InterFaces (mif)

2009-04-24 Thread Hui Deng
Christian,

I agree with what you said here, MIF should tackle this thoroughly.

I just wondering whether any ISP provider ICE service for open applications?
maybe my limited knowledge.

Regards,

-Hui

2009/4/24 Christian Vogt christian.v...@ericsson.com:

 On Apr 23, 2009, Hui Deng wrote:

 For what I know at the moment service provider deployment experience,
 ICE like solution has been deployed by a dedicate close network, this
 is not interact with MIF space we talked here, mif are resolve general
 issue with host connections, in that scenario, application is isolated.


 Hui -

 If the to-be MIF working group is to tackle the issue of address selection,
 then doing so thoroughly would require to also look into NAT traversal, and
 this includes ICE.  ICE specifies address selection rules for a large group
 of applications.

 - Christian



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] WG Review: Multiple InterFaces (mif)

2009-04-23 Thread Hui Deng
For what I know at the moment service provider deployment experience,
ICE like solution has been deployed by a dedicate close network, this
is not interact with MIF space we talked here, mif are resolve general issue
with host connections, in that scenario, application is isolated.

thanks.

-Hui.

2009/4/23 Ted Hardie har...@qualcomm.com:
 At 7:29 AM -0700 4/22/09, Margaret Wasserman wrote:

(1) As I pointed out in my previous message to Christian, address
selection is not (today) a transport-layer or application-layer function
in most cases.  Given that this is currently an Internet-layer function,
I think it makes sense to analyze the issues with address selection (as
part of the whole address/interface/router selection process)  in an
Internet Area group.  If we find that one of the problems we have is
that the Internet layer doesn't have the right information to make these
decisions, then possibly some follow-on work might need to be chartered
elsewhere.

 So this may be simply one of those cases where address selection
 does not fit your model, but at what layer would you describe the ICE
 spec as working?  Clearly, one aim in ICE is to provide a signalling-path
 mechanism for flow endpoint selection, which certainly relates to the question
 of address/interface selection.

 There is an old saw that my work is a cross-layer optimization; yours is
 a layer violation, and that guy's is a hideous hack.  However we have arrived
 here, it seems at least reasonable to say that we currently have this
 work muddled across a variety of layers.  If we can focus it and solve it
 at a single layer, the architecture gets easier and the protocol smog
 clear a bit.  But I seem to be hearing that tackling the big problem is
 ocean-boiling; what I am not clear on is whether the end result of piece work
 shifts the pain or actually reduces the smog.

 Perhaps it is just me; this is not stuff I am following in any depth.  But the
 impression I'm getting from following the thread is that there is some
 disagreement about how to structure the work to make sure it really
 does reduce pain, rather than just shift it around.

                        regards,
                                Ted
                                Ted
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] WG Review: Multiple InterFaces (mif)

2009-04-23 Thread Hui Deng
This type of implementation is not transparent to application, kind of
binding everything together, what mif is trying to do is to avoid it.

thanks

-Hui


2009/4/23 Christian Huitema huit...@windows.microsoft.com:
 (2) There is no way that these decisions can be made solely at the
 transport or application layer, because source (and to a lesser degree
 destination) address selection is tightly tied to the first-hop
 forwarding decision.  The outbound interface, source address and default
 router all have to be selected in a coordinate process, to avoid sending
 traffic that will be discarded on the outbound path, due to router
 filters.

 Actually, applications can to do that today, using the socket API, if the 
 stack implements the strong host model. The application just needs to bind 
 the socket to a specific IP address. Doing that ensures that packets sourced 
 by the application will use the specified address, will go out through the 
 interface corresponding to that address, and will use the default gateway 
 associated with that interface.

 -- Christian Huitema



 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] WG Review: Multiple InterFaces (mif)

2009-04-23 Thread Hui Deng
Hi, Marc,

Normally, host vendors normally really do not like to open this interface,
but anyhow it is more solution oriented, let's discuss it after.

-Hui

2009/4/23 Marc Blanchet marc.blanc...@viagenie.ca:
 Christian's suggestion is one way. not sure it is complete.

 but I don't agree with you (Deng): i.e. I think this suggestion is in
 scope of MIF wg. Maybe the outcome of the wg is a best practice document
 that tells application developers how to write good applications in
 context of MIF, where one practice is what Christian wrote, for example.

 Marc.

 Hui Deng a écrit :
 This type of implementation is not transparent to application, kind of
 binding everything together, what mif is trying to do is to avoid it.

 thanks

 -Hui


 2009/4/23 Christian Huitema huit...@windows.microsoft.com:
 (2) There is no way that these decisions can be made solely at the
 transport or application layer, because source (and to a lesser degree
 destination) address selection is tightly tied to the first-hop
 forwarding decision.  The outbound interface, source address and default
 router all have to be selected in a coordinate process, to avoid sending
 traffic that will be discarded on the outbound path, due to router
 filters.
 Actually, applications can to do that today, using the socket API, if the 
 stack implements the strong host model. The application just needs to 
 bind the socket to a specific IP address. Doing that ensures that packets 
 sourced by the application will use the specified address, will go out 
 through the interface corresponding to that address, and will use the 
 default gateway associated with that interface.

 -- Christian Huitema



 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

 ___
 mif mailing list
 m...@ietf.org
 https://www.ietf.org/mailman/listinfo/mif


 --
 =
 IPv6 book: Migrating to IPv6, Wiley. http://www.ipv6book.ca
 Stun/Turn server for VoIP NAT-FW traversal: http://numb.viagenie.ca
 DTN news service: http://reeves.viagenie.ca


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] WG Review: Multiple InterFaces (mif)

2009-04-23 Thread Hui Deng
Agree.

-Hui

2009/4/23 Giyeong Son g...@rim.com:
 I think we may need to understand what are the real problems that
 people/organizations (i.e. carriers, ISPs and vendors and users) have
 been currently struggling with in terms of simultaneous use of multiple
 networks.

 I think, Ralph seems to have clearly brought applicable practical use
 cases and/or criteria. So, with the use cases it might be worth to
 clarify if MIF will address and provide some recommendation for (at
 least) BCP which can answer to those use cases. If MIF does not
 (instead, only addresses partially, such as conflicting configurations
 and/or others), there may need other working group for focusing on BCP
 for the end-to-end practice of simultaneous use of multiple
 networks/interfaces. I believe that there is no working groups currently
 where can provide this kind of recommendation. They may be also willing
 to address partially from their perspective, similar with MIF if MIF
 want to tackle the problem partially.

 I think that we already know that simultaneous use of multiple networks
 is very crucial issue in various aspects by various organizations. Most
 of current carriers/ISPs/mobile device (including laptop) manufactures
 seems to be willing to hear about efficient, reliable and best common
 practice to handle the problem.

 Giyeong


 -Original Message-
 From: mif-boun...@ietf.org [mailto:mif-boun...@ietf.org] On Behalf Of
 Ralph Droms
 Sent: April 23, 2009 12:08 AM
 To: Christian Vogt
 Cc: mif; Margaret Wasserman; Sam Hartman; Scott Brim; David W. Hankins;
 Keith Moore; Hui Deng; IETF Discussion
 Subject: Re: [mif] WG Review: Multiple InterFaces (mif)

 Christian - I think address selection is part but not all of the
 problem.

 I would be happy to see a summary of current practice in dealing with
 simultaneous attachment to multiple networks.  How does an iPhone decide
 between its WiFi and dell interfaces?  How does an RG that can reach
 multiple next hop routers on its WAN interface select which router to
 forward to?  How does a laptop choose between its WiFi and wired
 interfaces?

 - Ralph

 On Apr 22, 2009, at 7:03 PM 4/22/09, Christian Vogt wrote:

 On Apr 22, 2009, Margaret Wasserman wrote:

 This topic, address selection, is not currently handled by
 applications.
 In many cases, it is handled entirely by the stack (through ordering
 of the destination ddresses in DNS replies and source address
 selection in the IP stack), and in other cases the application
 chooses a destination address with the stack choosing a source
 address.  There are certain cases (sometimes in solutions to the
 problems that we are discussing
 here) where applications do choose both the destination and sourece
 address, but they are not common.


 Margaret -

 From a system perspective, you are certainly right:  Applications
 typically do get help from the operating system in selecting their
 addresses.  From an OSI layering perspective, though, address
 selection still is performed at application layer.  In fact, if an
 application wants to do a complete job, especially a peer-to-peer
 application, it needs to select both source and destination address
 itself, possibly after running STUN, TURN, or ICE.

 My main point, though, was that we are talking about two orthogonal
 issues -- conflicting configuration and address selection.  This holds

 independently of the fact that an application may let the operating
 system accomplish part or all of address selection.

 Whether we take this to mean that both issues should be tackled in the

 same working group is a different story.  I personally don't see the
 orthogonality of the two issues as a reason not to tackle both issues
 in the same working group.  We just ought to be aware that the issues
 are separate, and the charter should describe them as such.  This
 said, there might be work-load- or work-scope-specific reasons that
 suggest splitting the work into separate working groups, like those
 brought up by Lars, Sam, and Scott.  Those arguments should be
 discussed as well.

 - Christian



 ___
 mif mailing list
 m...@ietf.org
 https://www.ietf.org/mailman/listinfo/mif

 ___
 mif mailing list
 m...@ietf.org
 https://www.ietf.org/mailman/listinfo/mif

 -
 This transmission (including any attachments) may contain confidential 
 information, privileged material (including material protected by the 
 solicitor-client or other applicable privileges), or constitute non-public 
 information. Any use of this information by anyone other than the intended 
 recipient is prohibited. If you have received this transmission in error, 
 please immediately reply to the sender and delete this information from your 
 system. Use, dissemination, distribution, or reproduction of this 
 transmission by unintended recipients

Re: WG Review: Multiple InterFaces (mif)

2009-04-22 Thread Hui Deng
If you are saying multiple address for multiple interface, that's fine.
but if you are talking multiple address for single interface, could you help to
point out any IPv4 scenario except VPN,

MIF is targeting at least half billion of subscribers who have this
real problem,
The problems you raised here is valuable to resolve, but MIF at the early stage
may only solve some simple and easy to solve work,

thanks

-Hui

 I'm saying there is a set of problems that exist if there are multiple
 addresses associated with a host for any reason.  This could be multiple
 addresses on a single interface (including aliases and multiple v6
 prefixes advertised on the network segment), multiple addresses because
 there are multiple active interfaces, multiple addresses because the
 host supports both v4 and v6, multiple addresses because the host has
 some sort of tunnel endpoint (which might be IPvX in IPvY, or an IPsec
 tunnel, or mobileIP), multiple addresses because the host is behind a
 NAT (any kind of NAT, including a v4/v6 NAT), and so on.

 And among those problem areas are: address selection (which differs
 depending on the needs of the app, and the configuration of the network
 to which the host is attached), referrals, sorting out policy conflicts,
 sorting out non-policy related configuration, security, etc.

 Keith

 Are you saying multiple addresses on one interface of the host?

 thanks

 -Hui


 2009/4/21 Keith Moore mo...@network-heretics.com:
 Jari Arkko wrote:
 There has been some discussion on whether the key issue is merging
 configuration from multiple sources (the DHCP view), multiple
 interfaces (the original view), multiple default routers (the routing
 view), multiple addresses (the IP layer view), multiple
 administrative domains (the operational view), and so on.

 I would like to make the point that there is no single, perfect answer.
 Its easy to find examples where the key issues above do not capture
 everything that we want to capture (see, e.g., George's response to
 Keith). Its really about the combination of these issues. And I think
 that is the way it should be.

 The charter text that I sent out yesterday attempts to explain what the
 problem space is without prejudicing ourselves to a view from just one
 perspective (except perhaps through the group's acronym). I think the
 rest is work on the problem statement, and we should let the group write
 that.

 The IESG telechat where this could be approved is two days away. Does
 someone have a big problem with the charter as written, serious enough
 to warrant a change?
 1. I really think that the emphasis on attachment to multiple networks
 is too narrow, as this is far from the only source of the problem.  As
 long as the WG is just trying to understand the problem and identify
 existing solutions, it seems appropriate to broaden the scope to
 consider the more general problem of multiple addresses per host.

 2. I also think that, when considering the effect on applications, it
 needs to be explicitly pointed out that p2p and distributed apps need to
 be considered separately from client-server apps that many people regard
 as representative.

 More generally I think that various kinds of effects need to be
 considered (i.e. not just the effects on applications) and it would be
 very helpful if the charter could lists some examples of these as
 illustrations of the breadth of scope.  That would minimize the
 potential for the WG to start off with many participants thinking _the_
 problem is X when the actual problem is much broader and hopefully
 get the WG in the mode where it tries to enumerate the various problems
 and impacts rather than to try to nail down _which_ problem it is and
 ignore the others.

 3. I am a bit concerned by the charter's mentioning of BCP documents as
 a possible output from the WG.  I thought I had seen language in the
 charter text saying that the group should write a BCP, but either I was
 mistaken or that language has since been removed.  But there's still a
 BCP mentioned as a deliverable in the milestones.  My concern is that
 the WG will take this as license to try to define best current practice,
 which I think is somewhat of a conflict of interest with trying to
 identify the problem - especially given the broad scope.

 Keith
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-21 Thread Hui Deng
 You are right money is more operation related not technical side. However, 
 I believe that this is also one of the most important factors and popularly 
 has been used for determining an interface with an (access) network among 
 multiple active interfaces automatically and dynamically. And, the mechanism 
 to adopt or apply like this network characteristic into the routing policy on 
 the network environment of simultaneous use of multiple interfaces may be 
 deeply related with technical side regarding simultaneous use of multiple 
 interfaces though.
== such network characteristic could become a generic routing element
which do decide
whether to use this routing or interface or not, but IETF not
necessraily mention it is Money or else. and also if it is not flat
rate based, I guess that host will be not so suffcient intelligent
to lead the routing based on the price like pennys or dollars.


 For instance, for a dual-mode device at home with WiFi and IP over cellular 
 available (e.g. CDMA, GPRS/EDGE, etc), combination of various network 
 characteristics in it would be the major factors to determine either WiFi or 
 cellular for packet transmission. My point here is how to present those 
 factors into the routing policy in order to determine a suitable interface 
 with the type of *DATA or PACKET* for the transmission would be one of  the 
 important technical side to be discussed in terms of simultaneous use of 
 multiple interfaces.
== Reply same as the above


 However, according to Hui, it seems to be out of MIF scope described in the 
 charter. BTW, again regarding MIF scope, I am wondering if we have already 
 gone through a scenario for simultaneous use of multiple active interfaces 
 based on a network environment with necessary associated network entities 
 (from enabling attachment of multiple access networks to processing a packet 
 transmission over the access networks from the link layer up to the transport 
 layer) in order to identify the MIF scope (presented in the charter). If it 
 has been already done or everyone understands clearly in terms of the MIF 
 scope, it is OK. Otherwise, it would be good to practice it in order to 
 clarify the MIF scope in the charter.
== Current charter says best current practice, and problems tatement,
those work will be done after the re-charter.

thanks

-Hui


 Giyeong

 -Original Message-
 From: Hui Deng [mailto:denghu...@gmail.com]
 Sent: April 19, 2009 11:40 AM
 To: Giyeong Son
 Cc: Ted Lemon; Ralph Droms; mif; ietf@ietf.org; gen-...@ietf.org; dhc WG; 
 black_da...@emc.com; Bernie Volz
 Subject: Re: [mif] [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

 Hi, Giyeong,

 At least those are not in the current charter scope.
 but Ted gave a one potential solution on one problem.

 Regarding to Money et al, I think IETF is not going to talk about it.
 which is more operational recommendation. Operation could recommend the 
 benchmark to let the user to select what he favoriate by human language other 
 than technical language.

 thanks

 -HUi

 2009/4/15 Giyeong Son g...@rim.com:
 I think Ted pointed out very interesting but crucial problems if I
 understood correctly. So, I'd like to confirm what Ted indicated and
 emphasized:

 1. How to dynamically/automatically/efficiently enable and manage
 multiple active interfaces on a host?
 2. How to utilize multiple active interfaces on a host?
 2. What are the efficient (or cost-effective) routing decision policy?
 Is it least cost routing policy? Or other? If it is least cost routing
 policy, what are the costs? Are they money to use the connection (e.g.
 WiFi vs. cellular), time to spend for the transmission, reliability
 of the transmission, etc?

 If those are what Ted indicated, I am also interested in asking if the
 above things are in scope of MIF. Based on my experience in terms of
 simultaneous use of multiple interfaces, the aboves are the most
 critical and interesting issues in practice in order to utilize the
 network environment of simultaneous use of multiple interfaces
 reliably and efficiently.


 Giyeong

 -Original Message-
 From: mif-boun...@ietf.org [mailto:mif-boun...@ietf.org] On Behalf Of
 Ted Lemon
 Sent: April 14, 2009 5:48 PM
 To: Ralph Droms
 Cc: mif; ietf@ietf.org; black_da...@emc.com; dhc WG; gen-...@ietf.org;
 Bernie Volz
 Subject: Re: [mif] [dhcwg] Gen-ART review of
 draft-ietf-dhc-container-00

 On Apr 14, 2009, at 3:31 AM, Ralph Droms wrote:

 Now, I admit I'm describing a hypothetical and abstract scenario.  I
 don't have a specific example of a situation in which a host might
 make decisions - either in the stack or in an application or ??? -
 about outbound traffic based on knowledge of how that traffic would
 be

 forwarded by the RG.

 That's right.   But I think it's not an accident that this is a
 hypothetical scenario.   In reality, a scenario like this has been
 likely ever since wireless and wired network interfaces became
 standard

Re: WG Review: Multiple InterFaces (mif)

2009-04-21 Thread Hui Deng
Hi, Jari,

What I suggest is like the below:


 Connections to Multiple Networks (mif)
 
 Last Modified: 2009-04-20

 Current Status: Proposed Working Group

 Chair(s):
 TBD

thanks

-Hui
2009/4/21 Jari Arkko jari.ar...@piuha.net:
 Hui,

 I'm not sure if I understood your comment about the WG name correctly. We
 cannot change it at this stage easily. So lets just keep it as is.

 Please find below the full charter proposal, with the suggested changes
 folded in from you and others.

 Jari

 Multiple InterFaces (mif)
 
 Last Modified: 2009-04-20

 Current Status: Proposed Working Group

 Chair(s):
 TBD

 Internet Area Director(s):
 Ralph Droms rdr...@cisco.com
 Jari Arkko jari.ar...@piuha.net

 Internet Area Advisor:
 TBD

 Mailing Lists:
 General Discussion: m...@ietf.org
 To Subscribe: https://www.ietf.org/mailman/listinfo/mif
 Archive: http://www.ietf.org/mail-archive/web/mif

 Description of Working Group:

 Many hosts have the ability to attach to multiple networks simultaneously.
 This can happen over multiple physical network interfaces, a combination of
 physical and virtual interfaces (VPNs or tunnels), or even through multiple
 default routers being on the same link. For instance, current laptops and
 smartphones typically have multiple access network interfaces.

 A host attached to multiple networks has to make decisions about default
 router selection, address selection, DNS server selection, choice of
 interface for packet transmission, and the treatment of configuration
 information received from the various networks. Some configuration objects
 are global to the node, some are local to the interface, and some are
 related to a particular prefix. Various issues arise when multiple
 configuration objects that are global to the node are received on different
 interfaces. At best, decisions about these matters have an efficiency
 effect. At worst, they have more significant effects such as security
 impacts, or even lead to communication not being possible at all.

 A number of operating systems have implemented various techniques to deal
 with attachments to multiple networks. Some devices employ only one
 interface at a time and some allow per-host configuration of preferences
 between the interfaces but still use just one at a time. Other systems allow
 per-application preferences or implement sophisticated policy managers that
 can be configured by users or controlled externally.

 The purpose of the MIF working group is to describe the issues of attaching
 to multiple networks on hosts, document existing practice, and make
 recommendations about best current practice. The WG shall employ and refer
 to existing IETF work in this area, including, for instance, strong/weak
 models (RFC 1122), address selection (RFC 3484), DHCP mechanisms, Router
 Advertisement mechanisms, and DNS recommendations. The focus of the working
 group should be on documenting the system level effects to host IP stacks
 and identification of gaps between the existing IETF recommendations and
 existing practice. The working group shall address both IPv4 and IPv6 as
 well as stateless and stateful configuration.

 Network discovery and selection on lower layers as defined by RFC 5113 is
 out of scope. Also, the group shall not develop new protocol or policy
 mechanisms; recommendations and gap analysis from the group are solely based
 on existing solutions. The group shall not assume any
 software beyond basic IP protocol support on its peers or in network nodes.
 No work will be done to enable traffic flows to move from one interface to
 another. The group recognizes existing work on mechanisms that require peer
 or network support for moving traffic flows such as RFC 5206, RFC 4980 and
 the use of multiple care-of addresses in Mobile IPv6. This group does not
 work on or impact such mechanisms.

 Once the group has completed its work items, the IETF can make an informed
 decision about rechartering the working group to define new mechanisms or
 asking other, specialized working groups (such as DHC or 6MAN) to deal with
 specific issues.

 Milestones:

 May 2009 WG chartered
 July 2009 Initial draft on problem statement adopted by the WG
 September 2009 Initial draft on existing practices adopted by the WG
 Jan 2010 Initial best current practices draft adopted by the WG
 March 2010 Problem statement draft submitted to the IESG for publication as
 an Informational RFC
 July 2010 Existing practices draft submitted to the IESG for publication as
 an Informational RFC
 September 2010 Best current practices draft submitted to the IESG for
 publication as a BCP
 October 2010 Recharter or close


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Multiple InterFaces (mif)

2009-04-21 Thread Hui Deng
Are you saying multiple addresses on one interface of the host?

thanks

-Hui


2009/4/21 Keith Moore mo...@network-heretics.com:
 Jari Arkko wrote:
 There has been some discussion on whether the key issue is merging
 configuration from multiple sources (the DHCP view), multiple
 interfaces (the original view), multiple default routers (the routing
 view), multiple addresses (the IP layer view), multiple
 administrative domains (the operational view), and so on.

 I would like to make the point that there is no single, perfect answer.
 Its easy to find examples where the key issues above do not capture
 everything that we want to capture (see, e.g., George's response to
 Keith). Its really about the combination of these issues. And I think
 that is the way it should be.

 The charter text that I sent out yesterday attempts to explain what the
 problem space is without prejudicing ourselves to a view from just one
 perspective (except perhaps through the group's acronym). I think the
 rest is work on the problem statement, and we should let the group write
 that.

 The IESG telechat where this could be approved is two days away. Does
 someone have a big problem with the charter as written, serious enough
 to warrant a change?

 1. I really think that the emphasis on attachment to multiple networks
 is too narrow, as this is far from the only source of the problem.  As
 long as the WG is just trying to understand the problem and identify
 existing solutions, it seems appropriate to broaden the scope to
 consider the more general problem of multiple addresses per host.

 2. I also think that, when considering the effect on applications, it
 needs to be explicitly pointed out that p2p and distributed apps need to
 be considered separately from client-server apps that many people regard
 as representative.

 More generally I think that various kinds of effects need to be
 considered (i.e. not just the effects on applications) and it would be
 very helpful if the charter could lists some examples of these as
 illustrations of the breadth of scope.  That would minimize the
 potential for the WG to start off with many participants thinking _the_
 problem is X when the actual problem is much broader and hopefully
 get the WG in the mode where it tries to enumerate the various problems
 and impacts rather than to try to nail down _which_ problem it is and
 ignore the others.

 3. I am a bit concerned by the charter's mentioning of BCP documents as
 a possible output from the WG.  I thought I had seen language in the
 charter text saying that the group should write a BCP, but either I was
 mistaken or that language has since been removed.  But there's still a
 BCP mentioned as a deliverable in the milestones.  My concern is that
 the WG will take this as license to try to define best current practice,
 which I think is somewhat of a conflict of interest with trying to
 identify the problem - especially given the broad scope.

 Keith
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

2009-04-20 Thread Hui Deng
some level of generic network characteristics benefit for the user.
one example could be that routing metric may need to be updated
to align with various kind of access technologies.

-Hui

2009/4/17 Giyeong Son g...@rim.com:
 Again as I mentioned, in order to prepare or build an efficient routing
 policy and to select an efficient connection/interface, it would be
 necessary to identify, classify and/or prioritize underlying network
 characteristics or information of the attached networks.

 In addition, as many network characteristics which are essential to be
 used for simultaneous use of multiple interfaces are not generic forms
 (e.g. SSID only for 802.11), these network characteristics may require a
 mechanism to make them be associated with generic (formed) elements used
 for routing policy preparation and routing decision. Therefore, if MIF
 can provide an efficient guideline or mechanism for associating, it
 would be really amazing.

 I believe, the current IP network related protocols and standardized
 technologies may not be enough to support that on multiple interface
 network environment.

 I think each vendor, carrier, service provider and/or technology, which
 utilizes or supports simultaneous use of multiple
 connections/interfaces, may have their own proprietary mechanism in
 terms of gathering of network characteristics of each interface/access
 network technology (e.g. WiFi, GPRS, CDMA, Bluetooth, etc.), their
 mapping mechanism with generic formed elements, routing policy and
 decision mechanisms with different IP based service networks owned by
 different service providers or different IP network enabling core
 networks owned by different carriers.

 So, the problem Ted and Ralph are addressing seems to be just one of
 issues (but only for WiFi network environments) in terms of network
 characteristic that may be necessary to be considered during selection
 of an efficient connection/interface from multiple candidates.

 Giyeong

 -Original Message-
 From: Ralph Droms [mailto:rdr...@cisco.com]
 Sent: April 16, 2009 1:32 PM
 To: Ted Lemon
 Cc: Giyeong Son; Hui Deng; dhc WG; gen-...@ietf.org; mif; ietf@ietf.org;
 black_da...@emc.com
 Subject: Re: [dhcwg] [mif] Gen-ART review of draft-ietf-dhc-container-00

 Yup ... there is currently no way to provide authenticated, meaningful
 identification of the network(s) to which a host is attached.  Without
 that identification, it's pretty hard to write any reasonable policies.

 - Ralph

 On Apr 16, 2009, at 1:26 PM 4/16/09, Ted Lemon wrote:

 On 2009/4/13 Ralph Droms rdr...@cisco.com wrote:
 For example, would a host process
 information received from a Starbucks network over its 802.11
 interface differently from information received a home network over
 the 802.11 interface?

 It's even more fun than that.   How do we reliably know that we are
 at Starbucks, and not at home?   The SSID?   That's not an
 authenticated token.   Currently Windows makes security decisions
 based on the SSID.   You could call this the best answer they could
 come up with for a problem with no good answers.   Or you could say
 that it instills the user with a false sense of security.   Either
 way, it's not something I'd be comfortable seeing in a protocol spec,
 so if the client is in fact to make decisions as you've
 suggested, we'd need a secure way of doing this.   I don't know
 enough about WPA Enterprise to know if there's a bidirectional
 authentication going on there - from the UI perspective it looks like
 it's one-way.



 -
 This transmission (including any attachments) may contain confidential 
 information, privileged material (including material protected by the 
 solicitor-client or other applicable privileges), or constitute non-public 
 information. Any use of this information by anyone other than the intended 
 recipient is prohibited. If you have received this transmission in error, 
 please immediately reply to the sender and delete this information from your 
 system. Use, dissemination, distribution, or reproduction of this 
 transmission by unintended recipients is not authorized and may be unlawful.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-20 Thread Hui Deng
 And you talked about Stuart Cheshire described a couple of IETFs ago,
 Could you help to point out the link?

 Sadly, I don't have it, but I suspect Stuart does, and I'm pretty sure he's
 reading this.
Thanks, let's see whether he is going to talk here.

 The gist of what he was saying is that if you have an IPv4 address that
 looks okay, and an IPv6 address that looks okay, you can't assume that they
 *are* okay, because there may be no route to the global internet on either
 your IPv4 or your IPv6 link.   So you must attempt to use both addresses,
 not just one, and you must do it at the same time.   Whichever one answers
 first, you take.
It means that the new IP model will try host's multiple connections
each time as you suggested as well.

 If you prefer either IPv4 or IPv6, and the transport you preferred happens
 to be the one that was broken, a smart user will disable the one you've
 preferred.   That user will then advise his or her friends, for example,
 that IPv6 creates instability, so you should disable it.   This impedes
 deployment.

 The unattended multiple interface situation is quite similar.   I think the
 attended case (a laptop with two or more network interfaces) is actually
 better handled through user intervention, because the user has knowledge of
 the physical situation that would be difficult to communicate to the
 computer.   But in the unattended case, you can get into the same sort of
 wrong learning situation, where a smart but naive user who debugs a
 network problem winds up learning a workaround that would impede
 interoperability if everybody did it.
Interesting thoughing, workaround will impede deployment.

Thanks

-Hui
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [mif] [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-19 Thread Hui Deng
I guess routable in mif mostly talking about there exist at least
two routing entry,(it doesn't matter whether it is the default router)
and both of them support one specific destination.
In that case, at least one routing entry will not work, it means not routable.

-Hui

2009/4/15 Giyeong Son g...@rim.com:
 I agree on Hui's and Ralpha's thoughts.

 There may be a necessary or worthy study that identifies and classifies what 
 kind of information or network characteristics of/from the interfaces are 
 necessary and helpful in order to judge active and valid routable interfaces 
 for the destination (I am not sure the meaning and scope of routable with a 
 destination in terms of MIF though) and determine an efficient/best one among 
 them for the destination endpoint for the moment.

 Giyeong



 -Original Message-
 From: mif-boun...@ietf.org [mailto:mif-boun...@ietf.org] On Behalf Of Hui Deng
 Sent: April 13, 2009 11:24 AM
 To: Ralph Droms
 Cc: mif; ietf@ietf.org; gen-...@ietf.org; black_da...@emc.com; dhc WG
 Subject: Re: [mif] [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

 Hi, Ralph,

 I agree what you said here, Scott raised the possible issue how to 
 differentiate the source.

 One instant thinking about the two different 802.11 interface is that the 
 principal source policy selection will not be able to tell the diffference, 
 we could allow high level policy to recommend how to handle it, give a 
 example, we may prioritize some wifi apn policy, and make others as just a 
 category of normal wifi.

 Anyhow, those thing need to be further studied based on the current practice.
 Thanks for the discussion.

 -Hui


 2009/4/13 Ralph Droms rdr...@cisco.com:
 Hui - I think there is an issue for hosts with multiple interfaces
 triggered by Scott's comments about the container option: even if a
 host is physically aware that it has multiple interfaces, how does it
 take the characteristics of the networks behind those interfaces into
 account when it merges information?  For example, would a host process
 information received from a Starbucks network over its 802.11
 interface differently from information received a home network over the 
 802.11 interface?

 - Ralph

 On Apr 12, 2009, at 2:34 AM 4/12/09, Hui Deng wrote:

 Hi, Scott,

 Based on the current MIF charter proposal, it consider only host.
 http://www.ietf.org/mail-archive/web/mif/current/msg00367.html
 I am wondering whether RG is a kind of host?

 Anyhow, this discussion benefit MIF for the future consideration how
 to identify the source.

 Many thanks

 -Hui

 2009/4/11 Scott Brim s...@employees.org:

 Excerpts from Ralph Droms on Fri, Apr 10, 2009 03:25:49PM -0400:

 Scott raises an interesting point about identifying the source of
 options when delivered to clients.

 BTW, Scott - what is DHS?

 Sorry, DHCP server

 The usual case - almost the only case today - is that there is a
 single upstream service provider and a single source of DHCP
 options to be passed along to the client.  In this scenario,
 there's no need to pass along any information identifying the source of 
 the options.

 To allow for a multihomed subscriber network, I can imagine adding
 a tag that would be passed along with the options so the subscriber
 client can identify the source of each option.  But, what would the
 client do with that information?  How would the client interpret
 it?  What is the syntax and semantics of the tagging?

 Taken a step farther, sourcing information might be required even
 if there is no intermediate RG and the contained option is not in
 use.  How does a device with multiple interfaces make policy
 decisions about information received on those multiple interfaces
 (which is pretty much the question Scott asks about the container option)?

 - Ralph

 Well put.  It all comes down to where information is going to be
 merged.  The case where a single RG client connected to multiple SP
 servers is essentially already covered by MIF/6man, they just need
 to document it.  If the information is merged at the RG server, then
 the RG server should somehow know which interface which DHCP
 information came from.  If all of the information is transparently
 passed to the consumer device, then it needs the tags as well.

 I don't know how the information could be usefully tagged -- the SP
 server's IP address doesn't sound like a good idea.  The WG should
 decide if tagging should be included in the container syntax or
 added later (but documented now as needing study).

 I'm CCing MIF in case people there aren't on the ietf list.

 Thanks ... Scott


 On Apr 7, 2009, at 2:25 PM 4/7/09, Scott Brim wrote:

 I have been selected as the General Area Review Team (Gen-ART)
 reviewer for this draft (for background on Gen-ART, please see
 http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

 Please wait for direction from your document shepherd or AD before
 posting a new version of the draft.

 Document: draft-ietf-dhc-container

Re: [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-19 Thread Hui Deng
Hi, Ted,

Excuse me for my late comment, I try to catch this thread.
For the case of the device has two interfaces which originate query.
Your suggestion looks quite interesting: try every plausible way.
I guess this is interesting topic in MIF future work.

And you talked about Stuart Cheshire described a couple of IETFs ago,
Could you help to point out the link?

many thanks

-Hui

2009/4/15 Ted Lemon ted.le...@nominum.com:
 On Apr 14, 2009, at 3:31 AM, Ralph Droms wrote:

 Now, I admit I'm describing a hypothetical and abstract scenario.  I
 don't have a specific example of a situation in which a host might
 make decisions - either in the stack or in an application or ??? -
 about outbound traffic based on knowledge of how that traffic would be
 forwarded by the RG.

 That's right.   But I think it's not an accident that this is a hypothetical
 scenario.   In reality, a scenario like this has been likely ever since
 wireless and wired network interfaces became standard on laptops.   And yet
 we don't have any real-life examples of problems that this has caused, which
 need solving.   To me, that seems like an indication that this is not a real
 operational problem.   That is, that the answer if two DHCP servers send
 the same client conflicting information on two different interfaces, that is
 a misconfiguration, and should be solved by correcting the misconfiguration
 is, in practice, the correct answer.

 If it were not, we would be hearing about concrete, real-world scenarios of
 the type you describe, not about hypothetical ones.

 I don't mean to minimize this issue - if in fact there is some future
 real-world scenario where this would be a serious problem, it would be good
 if we could anticipate it.   It might be profitable to consider analogies.

 For instance, right now I have IPv6 set up at home.   Because IPv6 isn't
 deployed at all in Tucson, the way I have this working is by tunneling.
 Since there are two tunnel brokers offering service for people like me, and
 I am a bit adventurous, I have two tunnels.   Right now, every IPv6 packet I
 ever transmit goes out one of those tunnels, with the exception of packets
 destined for a specific net, for which I have defined a static route.

 First of all, this scenario works just fine.   Both tunnels are configured
 as a default route - it just happens that Linux's route selection process
 always chooses the first one.   This algorithm would work poorly if one
 interface were preferable to the other, but since both are equivalent it's
 not a problem.

 Second, though, why do I have a default route configured?   It's because I'm
 talking to a node on that network that will only answer if I use the source
 address of one of the tunnels; and will ignore any packets I send it with
 the other source address.   So in the case where there was a problem, I
 manually configured a workaround.

 How could we automatically solve this problem?   Simple: any time we are
 initiating communication with a device on the network, and do not know that
 the communication is going to work, we simultaneously start the
 communication in every plausible way.   So suppose that there are two 
 records corresponding to the machine I want to talk to, and I have two
 global IP addresses.   I'm going to send four syn packets.   The first
 syn-ack I get back is the one I'm actually going to use - I'll send RST
 packets to the other three.

 This is analogous to the solution Stuart Cheshire described a couple of
 IETFs ago to the problem of IPv6 causing connectivity problems instead of
 expanding connectivity opportunities - you can't prefer one solution over
 the other, because you have no basis for doing so, so you have to try all
 possible solutions and choose the one that works best.   My only extension,
 if it is one, is that I've added the source address to the matrix - I'm not
 sure Stuart mentioned that.

 Now, how does this extend when we go to DHCP?   Suppose I have DNS resolver
 configurations from two DHCP servers.   I try both in parallel.   I can
 winnow it down a bit: since I received the DNS server information from one
 DHCP server on one interface, and the DNS server information from the other
 DHCP server on a different interface, I only have to try to query the DNS
 server using the source addresses of the interface on which that DNS
 server's configuration information was received.

 But how do I do that if the device that has two interfaces is not the device
 originating the query, as is the case with the container option?   I think
 the answer is that I can't.   There is no heuristic that I can define that
 will always make the right choice, because the device receiving the
 container options has to make the choice for the client.

 In DHCPv6, we could at least give the client a hint about what to do as
 follows:

 Suppose that I am dual-homed.   I ask for, and get, a container option on
 both outward-facing interfaces.   I also wind up configuring one 

Re: WG Review: Multiple InterFaces (mif)

2009-04-18 Thread Hui Deng
Hi, Jari and all

It will be good to include that scenario, that scenario already exist
and haven't been covered by other working group at the moment.
Starting from changeing the working group full name looks like a feasible way.
please check comments inline started with ==

2009/4/18 Jari Arkko jari.ar...@piuha.net:
 I wanted to bring up a comment that was raised during the IESG and IAB
 discussions about this charter by Adrian and others.

 When the work started, it was clearly about multiple interfaces. Upon closer
 inspection, we have realized that the overall problem is somewhat larger.
 Problems that occur with multiple interfaces also occur even with one
 interface, when you have a number of default routers on the same link. The
 current charter text reflects this in some parts of the text, e.g.,

 Many hosts have the ability to connect to multiple networks
 simultaneously. This can happen over multiple physical network
 interfaces, a combination of physical and virtual interfaces (VPNs or
 tunnels), or even through multiple default routers being on the same
 link.
== resolving the issue of multiple default routers in multiple
interfaces doesn't
really solve the issue of multiple default routers in one single interface.


 However, it was pointed out that the text is not consistent. Other parts
 still talk about multiple interfaces, e.g.,

 A number of operating systems have implemented various techniques to
 deal with multiple interfaces. Some devices employ only one interface at
 a time and some allow per-host configuration of preferences between the
 interfaces but still use just one at a time. Other systems allow
 per-application preferences or implement sophisticated policy managers
 that can be configured by users or controlled externally.

 The purpose of the MIF working group is to describe the issues
 surrounding the use of multiple interfaces on hosts, document existing
 practice, and make recommendations about best current practice.

 This has created some confusion with regards to what really is in scope. Are
 hosts with multiple physical interfaces in scope (obviously yes)? Are hosts
 with multiple virtual or physical interfaces in scope (yes)? Are hosts with
 one interface but multiple connections to different networks in scope (I
 think they should be)? Are we only talking about multiple interfaces or
 connections when they are to different administrative domains (I do not
 think it really matters, even in one domain the parameters can be
 different)?
== I agree that hosts with one interface but multiple connections to
different networks in scope. This has been the scenarios of many
mobile network.
I also agree that not necessarily mention whether it is the same or
different administrative domains.


 I would like to solicit suggestions on how to modify the text to be fully
 aligned. Note: we need to keep the name of the group the same, as it
 something that is already familiar to people, not to mention the fact that
 the IETF database system does not allow an acronym change very easily.

 Would it be enough to change s/multiple interfaces/connections to multiple
 networks/ in the second quoted text excerpt?
== changing the full name is the good way.
then charter could be modified correspondense.
The purpose of the MIF working group is to describe the issues
of connecting to multiple networks on hosts, document existing
practice, and make recommendations about best current practice.

Thanks,

-Hui


 Jari

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-13 Thread Hui Deng
Hi, Ralph,

I agree what you said here, Scott raised the possible issue how to
differentiate the source.

One instant thinking about the two different 802.11 interface is that
the principal source policy selection will not be able to tell the
diffference, we could allow high level policy to recommend how to
handle it, give a example, we may prioritize some wifi apn policy, and
make others as just a category of normal wifi.

Anyhow, those thing need to be further studied based on the current practice.
Thanks for the discussion.

-Hui


2009/4/13 Ralph Droms rdr...@cisco.com:
 Hui - I think there is an issue for hosts with multiple interfaces triggered
 by Scott's comments about the container option: even if a host is physically
 aware that it has multiple interfaces, how does it take the characteristics
 of the networks behind those interfaces into account when it merges
 information?  For example, would a host process information received from a
 Starbucks network over its 802.11 interface differently from information
 received a home network over the 802.11 interface?

 - Ralph

 On Apr 12, 2009, at 2:34 AM 4/12/09, Hui Deng wrote:

 Hi, Scott,

 Based on the current MIF charter proposal, it consider only host.
 http://www.ietf.org/mail-archive/web/mif/current/msg00367.html
 I am wondering whether RG is a kind of host?

 Anyhow, this discussion benefit MIF for the future consideration how
 to identify the source.

 Many thanks

 -Hui

 2009/4/11 Scott Brim s...@employees.org:

 Excerpts from Ralph Droms on Fri, Apr 10, 2009 03:25:49PM -0400:

 Scott raises an interesting point about identifying the source of
 options when delivered to clients.

 BTW, Scott - what is DHS?

 Sorry, DHCP server

 The usual case - almost the only case today - is that there is a single
 upstream service provider and a single source of DHCP options to be
 passed along to the client.  In this scenario, there's no need to pass
 along any information identifying the source of the options.

 To allow for a multihomed subscriber network, I can imagine adding a tag
 that would be passed along with the options so the subscriber client can
 identify the source of each option.  But, what would the client do with
 that information?  How would the client interpret it?  What is the
 syntax
 and semantics of the tagging?

 Taken a step farther, sourcing information might be required even if
 there is no intermediate RG and the contained option is not in use.  How
 does a device with multiple interfaces make policy decisions about
 information received on those multiple interfaces (which is pretty much
 the question Scott asks about the container option)?

 - Ralph

 Well put.  It all comes down to where information is going to be
 merged.  The case where a single RG client connected to multiple SP
 servers is essentially already covered by MIF/6man, they just need to
 document it.  If the information is merged at the RG server, then the
 RG server should somehow know which interface which DHCP information
 came from.  If all of the information is transparently passed to the
 consumer device, then it needs the tags as well.

 I don't know how the information could be usefully tagged -- the SP
 server's IP address doesn't sound like a good idea.  The WG should
 decide if tagging should be included in the container syntax or added
 later (but documented now as needing study).

 I'm CCing MIF in case people there aren't on the ietf list.

 Thanks ... Scott


 On Apr 7, 2009, at 2:25 PM 4/7/09, Scott Brim wrote:

 I have been selected as the General Area Review Team (Gen-ART)
 reviewer for this draft (for background on Gen-ART, please see
 http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

 Please wait for direction from your document shepherd
 or AD before posting a new version of the draft.

 Document: draft-ietf-dhc-container-00
 Reviewer: Scott Brim
 Review Date:         7 April 2009
 IESG Telechat date: 14 April 2009

 Summary:

 This draft is on the right track but has open issues.

 Comments:

 More significant:

  I am concerned about multiple interface scenarios as are being
  discussed in MIF and 6MAN, where either the RG is multiply connected
  or the end device is.  For a discussion of the sort of problems that
  lead to this concern, see (for example) notes from the MIF BOF at
  IETF74.

  - There must be a way to associate options with a particular
    upstream DHS they were obtained from, when the container is passed
    to the RG server and perhaps to the end device.  This source
    information may or may not be in the container itself -- that's up
    to the WG to decide.  If it is decided that the source information
    will not be part of the container syntax, at least the fact that
    it is necessary should be documented for people who ultimately do
    specify how container options are passed.

  - The SP server may have its ideas of how a consumer device should
    be configured, but it is not appropriate to say

Re: [dhcwg] Gen-ART review of draft-ietf-dhc-container-00

2009-04-12 Thread Hui Deng
Hi, Scott,

Based on the current MIF charter proposal, it consider only host.
http://www.ietf.org/mail-archive/web/mif/current/msg00367.html
I am wondering whether RG is a kind of host?

Anyhow, this discussion benefit MIF for the future consideration how
to identify the source.

Many thanks

-Hui

2009/4/11 Scott Brim s...@employees.org:
 Excerpts from Ralph Droms on Fri, Apr 10, 2009 03:25:49PM -0400:
 Scott raises an interesting point about identifying the source of
 options when delivered to clients.

 BTW, Scott - what is DHS?

 Sorry, DHCP server

 The usual case - almost the only case today - is that there is a single
 upstream service provider and a single source of DHCP options to be
 passed along to the client.  In this scenario, there's no need to pass
 along any information identifying the source of the options.

 To allow for a multihomed subscriber network, I can imagine adding a tag
 that would be passed along with the options so the subscriber client can
 identify the source of each option.  But, what would the client do with
 that information?  How would the client interpret it?  What is the syntax
 and semantics of the tagging?

 Taken a step farther, sourcing information might be required even if
 there is no intermediate RG and the contained option is not in use.  How
 does a device with multiple interfaces make policy decisions about
 information received on those multiple interfaces (which is pretty much
 the question Scott asks about the container option)?

 - Ralph

 Well put.  It all comes down to where information is going to be
 merged.  The case where a single RG client connected to multiple SP
 servers is essentially already covered by MIF/6man, they just need to
 document it.  If the information is merged at the RG server, then the
 RG server should somehow know which interface which DHCP information
 came from.  If all of the information is transparently passed to the
 consumer device, then it needs the tags as well.

 I don't know how the information could be usefully tagged -- the SP
 server's IP address doesn't sound like a good idea.  The WG should
 decide if tagging should be included in the container syntax or added
 later (but documented now as needing study).

 I'm CCing MIF in case people there aren't on the ietf list.

 Thanks ... Scott


 On Apr 7, 2009, at 2:25 PM 4/7/09, Scott Brim wrote:

 I have been selected as the General Area Review Team (Gen-ART)
 reviewer for this draft (for background on Gen-ART, please see
 http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

 Please wait for direction from your document shepherd
 or AD before posting a new version of the draft.

 Document: draft-ietf-dhc-container-00
 Reviewer: Scott Brim
 Review Date:         7 April 2009
 IESG Telechat date: 14 April 2009

 Summary:

 This draft is on the right track but has open issues.

 Comments:

 More significant:

   I am concerned about multiple interface scenarios as are being
   discussed in MIF and 6MAN, where either the RG is multiply connected
   or the end device is.  For a discussion of the sort of problems that
   lead to this concern, see (for example) notes from the MIF BOF at
   IETF74.

   - There must be a way to associate options with a particular
     upstream DHS they were obtained from, when the container is passed
     to the RG server and perhaps to the end device.  This source
     information may or may not be in the container itself -- that's up
     to the WG to decide.  If it is decided that the source information
     will not be part of the container syntax, at least the fact that
     it is necessary should be documented for people who ultimately do
     specify how container options are passed.

   - The SP server may have its ideas of how a consumer device should
     be configured, but it is not appropriate to say that the SP
     server MUST be able to control which DHCP options are transmitted
     to the consumer device.  The RG server may need to make decisions
     about information from multiple DHCP servers.  Perhaps you could
     say that the SP server MUST be able to provide information to
     the RG server.

 Less significant:

   5.1 and 5.2

     Alignment between the v4 and v6 descriptions would be better. The
     v4 description has code in the diagram and says that code is
     OPTION_CONTAINER_V4.  The v6 description has OPTION_CONTAINER_V6
     in the diagram and says that option-code is OPTION_CONTAINER_V6.
 ___
 dhcwg mailing list
 dh...@ietf.org
 https://www.ietf.org/mailman/listinfo/dhcwg

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNS/IP

2009-01-12 Thread Hui Deng
May I chime in, I feel identity type is a good idea.

But if you map DNS to other identity,
how network socket connection could work in that case/

thanks for your consideration

-Hui

2009/1/12 Toni Stoev i...@tonistoev.info

 On Monday 12 January 2009 00:51:24 TSG sent:
  Toni Stoev wrote:
   Hi,
  
   DNS job
  
   When a connection to a network node is to be initiated its DNS name is
 resolved to an IP address which shows the location of the node on the
 network. So network nodes are findable by name even if their locations
 change.
  
  I think you are backwards...  The nodes are still reachable if they
  change their physical location or the assigned networks addresses
  temporarily mapped too those names by DNS or DHCP.

 Findable, not reachable, even just identifiable, is what is essential for
 the naming system DNS.

   The job of the DNS is to identify a node by its name. Another job is to
 maintain information about node's current location so a new connection can
 be started at any time.
  
  Hmm... I think the job of DNS is to map the 'text based system names' to
  a network address that the routing infrastructure and features can
  create a set of pathways for that data to reach said system.

 The job of the Domain Name System, not routing or delivery system, is to
 map names to identity. Furthermore, identity mapped to may be of entire
 routing domains, aggregating nodes.

   Why should DNS be bothered with connectivity and/or topology status?
   There must be a distinct mechanism to handle mapping of node identity
 to network location.
  
  GeoPriv would have you believe that another

 Still network location is disticnt from geographic.

 I suggest that there be a networking asset, an address type, that
 represents network identity of nodes. And addresses of that type be resolved
 to by DNS name queries and be mapping to unicast network addresses.
 This way DNS shall be unburdened of connectivity, routing and reachability
 issues related to named nodes.
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


The Internet architecture - pointer to MIF (Multiple Interfaces) discussion

2009-01-05 Thread Hui Deng
Hello,all

We have setup an mailing list to discuss the host which would like to use
multiple interfaces.
several issues has been identified based on problem statement.

http://www.ietf.org/internet-drafts/draft-blanchet-mif-problem-statement-00.txt

Please be awared that it is different from multihoming (site with multiple
interfaces).

Please feel free to join our discussion over there,
https://www.ietf.org/mailman/listinfo/mif

thanks

-Hui
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf