Re: Consensus Call: draft-weil-shared-transition-space-request

2011-11-29 Thread Mark Townsley

 On October 10, 2011, the IESG issued a last call for comments regarding 
 draft-weil-shared-transition-space-request-09 (IANA Reserved IPv4 Prefix for 
 Shared CGN Space). While the community did not display consensus supporting 
 the draft, it also did not display consensus against the draft. Therefore, I 
 will submit the draft to the full IESG for its consideration at its December 
 1 teleconference. The draft will be published as a BCP if a sufficient number 
 of IESG members ballot Yes or No Objection, and if no IESG member ballots 
 Discuss.
If I recall correctly from my days on the IESG, a sufficient number of IESG 
members with a Yes for document advancement is exactly one. Often, that is 
the AD bringing the document forward to the IESG. The shepherding AD is saying, 
Yes I have read this document, seen a sufficient level of support in the IETF 
for it, etc. Sometimes, other ADs jump on board with their own Yes, but it's 
not required.

Ron, if I read this email from you correctly, you are saying that you have not 
seen that level of consensus yourself, yet you are bringing the document 
forward to the IESG to weigh advancement anyway. The process is flexible enough 
to allow that and I'm not questioning this action alone, but I do think it 
would be a good idea for you to not put in your own Yes for the document in 
this case. This raises the bar ever so slightly for advancement, forcing the 
IESG deliberations to convince at least one AD to stand behind what is being 
done with a Yes vs. a No Objection. 

- Mark

 
 Because the decision to submit this draft to the full IESG is controversial, 
 I will explain the decision making process.
 
 The IETF has a precedent for interpreting silence as consent. Typically, if a 
 last call elicits no response, the draft is brought to the full IESG for 
 consideration. The October 10 last call regarding 
 draft-weil-shared-transition-space-request-09 evoked only two responses. One 
 response supported publication of the draft while the other was opposed to 
 it. The respondent voicing support for the draft offered no rationale. The 
 respondent objecting offered many editorial comments, but almost no rationale 
 for blocking the draft once the editorial comments are addressed.
 
 Because the October 10 last call elicited so little response, and because 
 many community members have privately expressed strong opinions regarding 
 this draft, I will summarize outstanding issues below. The following are 
 arguments *against* draft-weil-shared-transition-space-request:
 
 - Allocation of a special-use /10 does not hasten the deployment of IPv6. It 
 only extends the life of the IPv4 network.
 - If a special-use /10 is allocated, it will be used as additional RFC 1918 
 address space, despite a specific prohibition against such use stated by the 
 draft.
 - If a special-use /10 is allocated, it will encourage others to request 
 still more special-use address space.
 - Some applications will break. These applications share the characteristic 
 of assuming that an interface is globally reachable if it is numbered by an 
 non-RFC 1918 address. To date, the only application that has been identified 
 as breaking is 6to4, but others may be identified in the future.
 
 Arguments *supporting* draft-weil-shared-transition-space-request-09 assume 
 that operators will deploy CGNs and will number the interfaces between CGN 
 and CPE. If the /10 proposed by draft-weil-shared-transition-space-request is 
 not allocated, operators will number from one of the following:
 
 - public address space 
 - RFC 1918 address space
 - squat space
 
 If operators number from public address space, they will deplete an already 
 scarce resource. If operators number from RFC 1918 space and the same RFC 
 1918 space is used on the customer premise, some CPE will behave badly. The 
 consequences of numbering from squat space are determined by the squat space 
 that is chosen.
 
 In summary, allocation of the /10 will have certain adverse effects upon the 
 community. However, failure to allocate the /10 will have different adverse 
 effects on the community. The IESG is being asked to choose the lesser of two 
 evils.

 
 --
 Ron Bonica
 vcard:   www.bonica.org/ron/ronbonica.vcf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Consensus Call: draft-weil-shared-transition-space-request

2011-11-29 Thread Mark Townsley

On Nov 29, 2011, at 9:13 PM, Chris Donley wrote:

 Ron,
 
 One point of clarification, in your *against* list, you include:
 
 
 On 11/28/11 2:25 PM, Ronald Bonica rbon...@juniper.net wrote:
 
 - Some applications will break. These applications share the
 characteristic of assuming that an interface is globally reachable if it
 is numbered by an non-RFC 1918 address. To date, the only application
 that has been identified as breaking is 6to4, but others may be
 identified in the future.
 
 Since this address space is between the CPE router and CGN device, and is
 therefore not globally routable, the same application(s) (e.g. 6to4) will
 break if public or 'squat' space are used instead of shared CGN space.
 Such applications rely on the home router detecting that there is private,
 non-globally routable space (i.e. RFC1918) on the WAN and disabling such
 an application.  While that same detection code will always fail for
 public address space and squat space since the exact range is not defined,
 there is the possibility of fixing the detection code in home routers if
 we do define shared CGN space for that purpose.

http://tools.ietf.org/html/draft-ietf-v6ops-6204bis-03 has this requirement:


   DLW-4:  If the IPv6 CE Router is configured with a public IPv4
   address on its WAN interface, where public IPv4 address is
   defined as any address which is not in the private IP address
   space specified in [RFC5735], then the IPv6 CE Router SHOULD
   disable the DS-Lite B4 element.

I'm not sure I personally agree with this requirement, but suffice to say if 
this kind of language is popping up in our own v6ops documents at this very 
moment, there is a decent chance that it has made its way into specifications 
and code elsewhere.

- Mark

 
 Chris
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Softwires] [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-29 Thread Mark Townsley

On Sep 28, 2011, at 8:12 PM, Cameron Byrne wrote:

 On Wed, Sep 28, 2011 at 9:26 AM, Mark Townsley m...@townsley.net wrote:
 
 
 +1 ... since the alternative is that apps that require ipv4 sockets and
 pass ipv4 literals are stranded on ipv6 only networks.
 
 Running code on the n900 shows that nat464 provides real user and
 network benefit
 
 Frankly, I preferred it when you were running IPv6-only without BIH on your 
 trial, providing pressure to get rid of all those stranded literals and 
 pushing apps to open ipv6 sockets :-/
 
 - Mark
 
 We're still doing that, and IPv6-only is still my philosophical
 preference and that is how we are launching the IPv6 + NAT64/DNS64
 service into the production mobile network (real soon now).  No change
 in that path.
 
 But some power users wanted their IPv4-only applications like Skype
 to work so they coded a NAT46 work-around for the N900.  It is clever,
 it works.

Ah, so it's not a model developed and (necessarily) supported by you. Thanks 
for the clarification. 

Yes, it makes sense that this would end up happening as the hosts evolve to 
what the network provides.

- Mark

 
 Their process of feeling the pain of a very few pesky IPv4-only apps
 and working around it is all documented here:
 http://talk.maemo.org/showthread.php?t=60320
 
 Running NAT46 code here: http://code.google.com/p/n900ipv6/wiki/Nat64D
 
 In the end (as well as IPv6-only near term in mobile), IP version
 agnostic apps will prove to be more reliable and therefore will get
 more market share.
 
 Cameron

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Softwires] [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-28 Thread Mark Townsley


 +1 ... since the alternative is that apps that require ipv4 sockets and
 pass ipv4 literals are stranded on ipv6 only networks.
 
 Running code on the n900 shows that nat464 provides real user and
 network benefit

Frankly, I preferred it when you were running IPv6-only without BIH on your 
trial, providing pressure to get rid of all those stranded literals and pushing 
apps to open ipv6 sockets :-/

- Mark
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] 6to4v2 (as in ripv2)?

2011-07-27 Thread Mark Townsley

On Jul 27, 2011, at 7:09 AM, Fred Baker wrote:

 
 On Jul 26, 2011, at 6:49 PM, Brian E Carpenter wrote:
 
 Since 6to4 is a transition mechanism it has no long term future *by 
 definition*. Even if someone chooses to design a v2, who is going to 
 implement it?
 
 Actually, I think one could argue pretty effectively that 6rd is 6to4-bis. 

+1

- Mark

 ___
 v6ops mailing list
 v6...@ietf.org
 https://www.ietf.org/mailman/listinfo/v6ops

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [homegate] HOMENET working group proposal

2011-07-01 Thread Mark Townsley


On Jun 30, 2011, at 5:46 PM, Keith Moore wrote:

 
 On Jun 30, 2011, at 5:57 AM, Mark Townsley wrote:
 
 
 I think the consensus we had in the past BoFs and discussion in and around 
 this topic can be summed up as stating that homenet deliverables will:
 
 - coexist with (existing) IPv4 protocols, devices, applications, etc.
 - operate in a (future) IPv6-only home network in the absence of IPv4
 - be IP-agnostic whenever possible
 
 I'd like for this group to relax the wherever possible bit, so as to not 
 preclude solutions where IPv6 can do a better job than IPv4.

Yes, and I think that IPv6 should naturally do a better job than IPv4 in the 
cases where it can. 

My original mail had this restatement of the above, which I think gets closer 
to what you want:

 However, when we can define something that is needed for IPv6 in a way that 
 is also useful for IPv4 without making significant concessions, we should go 
 ahead and do so.


- Mark

 
 IPv4 is a dinosaur gasping for its last breaths.
 
 Keith
 
 
 ___
 homegate mailing list
 homeg...@ietf.org
 https://www.ietf.org/mailman/listinfo/homegate

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [homegate] HOMENET working group proposal

2011-07-01 Thread Mark Townsley

On Jun 30, 2011, at 6:36 PM, Keith Moore wrote:

 On Jun 30, 2011, at 12:33 PM, Mark Townsley wrote:
 
 I think the consensus we had in the past BoFs and discussion in and around 
 this topic can be summed up as stating that homenet deliverables will:
 
 - coexist with (existing) IPv4 protocols, devices, applications, etc.
 - operate in a (future) IPv6-only home network in the absence of IPv4
 - be IP-agnostic whenever possible
 
 I'd like for this group to relax the wherever possible bit, so as to not 
 preclude solutions where IPv6 can do a better job than IPv4.
 
 Yes, and I think that IPv6 should naturally do a better job than IPv4 in the 
 cases where it can. 
 
 My original mail had this restatement of the above, which I think gets 
 closer to what you want:
 
 However, when we can define something that is needed for IPv6 in a way 
 that is also useful for IPv4 without making significant concessions, we 
 should go ahead and do so.
 
 when the group can define something that is useful in IPv6, it shouldn't 
 matter whether it's also useful for IPv4.

The idea is not to go out of our way for IPv4, but if the topic is IP agnostic 
anyway, so be it. To be clear, there is no *requirement* to support IPv4 here. 
However, there is no requirement to avoid IPv4 *if* it doesn't cause 
significant concession in the IPv6 design either.

This cuts both ways, if there is something that is working well in IPv4 that we 
need to carry over to IPv6 with simple extensions, we'll do that and 
capitalizing on that running-code should be considered a good thing. We don't 
want to invent new v6 protocols from scratch that don't work with IPv4 when 
there is no need. For example (and I think this is hinted at in the charter), 
we might use naming and service discovery that already exists for IPv4, adapted 
the the v6 homenet. This doesn't mean we need to re-invent a v6-only naming 
system from scratch - i'd much rather use one that is there, which very well 
may support v4 and v6. 

 
 please don't constrain home networks to work only within the confines of IPv4 
 brain damage.

What I think I am saying here is that we will do our best to perform as if our 
brains are not damaged, and equally try to avoid damaging our brains in the 
process.

- Mark

 
 Keith
 
 ___
 homegate mailing list
 homeg...@ietf.org
 https://www.ietf.org/mailman/listinfo/homegate

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [homegate] HOMENET working group proposal

2011-06-30 Thread Mark Townsley

I think the consensus we had in the past BoFs and discussion in and around this 
topic can be summed up as stating that homenet deliverables will:

- coexist with (existing) IPv4 protocols, devices, applications, etc.
- operate in a (future) IPv6-only home network in the absence of IPv4
- be IP-agnostic whenever possible

In other words, anything we do for the IPv6 homenet cannot actively break 
what's already running on IPv4. Also, trying to define what the IPv4 home 
network should be has long reached a point of diminishing returns given the 
effort in doing so coupled with our ability to significantly affect what's 
already deployed. There's still hope we can help direct IPv6, as such that is 
homenet's primary focus.  However, when we can define something that is needed 
for IPv6 in a way that is also useful for IPv4 without making significant 
concessions, we should go ahead and do so. 

- Mark



On Jun 30, 2011, at 9:25 AM, Mikael Abrahamsson wrote:

 On Thu, 30 Jun 2011, Fernando Gont wrote:
 
 My point was that, except for the mechanism for PD, I don't see a 
 substantial difference here that would e.g. prevent this from being 
 developed for IPv4 (in addition to IPv6). -- Yes, I know we need to deploy 
 IPv6... but I don't think you can expect people to get rid of their 
 *working* IPv4 devices... (i.e., not sure why any of this functionality 
 should be v6-only)
 
 Chaining NAT boxes already work. I also feel that we shouldn't put in a lot 
 of work to develop IPv4 further, that focus should be put on IPv6.
 
 I think this deserves a problem statement that clearly describes what we 
 expect to be able to do (but currently can't), etc. And, if this is meant to 
 be v6-only, state why v4 is excluded -- unless we're happy to have people 
 connect their IPv4-devices, and see that they cannot communicate anymore.
 
 IPv4 should be excluded because it's a dead end, and we all know it. We're 
 just disagreeing when it's going to die and how.
 
 -- 
 Mikael Abrahamssonemail: swm...@swm.pp.se
 ___
 homegate mailing list
 homeg...@ietf.org
 https://www.ietf.org/mailman/listinfo/homegate

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [homegate] HOMENET working group proposal

2011-06-30 Thread Mark Townsley

On Jun 30, 2011, at 4:55 PM, Stephen [kiwin] PALM wrote:

 Thanks Mark for stating that.
 It would really be helpful if this type of text is included in the 
 description/charter.
 The lack of of this information in the recently distributed material caused
 several immediate allergic reactions...

I'm happy to include it in the next rev.

- Mark

 
 regards, kiwin
 
 On 6/30/2011 2:57 AM, Mark Townsley wrote:
 
 I think the consensus we had in the past BoFs and discussion in and around 
 this topic can be summed up as stating that homenet deliverables will:
 
 - coexist with (existing) IPv4 protocols, devices, applications, etc.
 - operate in a (future) IPv6-only home network in the absence of IPv4
 - be IP-agnostic whenever possible
 
 In other words, anything we do for the IPv6 homenet cannot actively break 
 what's already running on IPv4. Also, trying to define what the IPv4 home 
 network should be has long reached a point of diminishing returns given the 
 effort in doing so coupled with our ability to significantly affect what's 
 already deployed. There's still hope we can help direct IPv6, as such that 
 is homenet's primary focus.  However, when we can define something that is 
 needed for IPv6 in a way that is also useful for IPv4 without making 
 significant concessions, we should go ahead and do so.
 
 - Mark
 
 
 
 On Jun 30, 2011, at 9:25 AM, Mikael Abrahamsson wrote:
 
 On Thu, 30 Jun 2011, Fernando Gont wrote:
 
 My point was that, except for the mechanism for PD, I don't see a 
 substantial difference here that would e.g. prevent this from being 
 developed for IPv4 (in addition to IPv6). -- Yes, I know we need to deploy 
 IPv6... but I don't think you can expect people to get rid of their 
 *working* IPv4 devices... (i.e., not sure why any of this functionality 
 should be v6-only)
 
 Chaining NAT boxes already work. I also feel that we shouldn't put in a lot 
 of work to develop IPv4 further, that focus should be put on IPv6.
 
 I think this deserves a problem statement that clearly describes what we 
 expect to be able to do (but currently can't), etc. And, if this is meant 
 to be v6-only, state why v4 is excluded -- unless we're happy to have 
 people connect their IPv4-devices, and see that they cannot communicate 
 anymore.
 
 IPv4 should be excluded because it's a dead end, and we all know it. We're 
 just disagreeing when it's going to die and how.
 
 --
 Mikael Abrahamssonemail: swm...@swm.pp.se
 ___
 homegate mailing list
 homeg...@ietf.org
 https://www.ietf.org/mailman/listinfo/homegate
 
 ___
 homegate mailing list
 homeg...@ietf.org
 https://www.ietf.org/mailman/listinfo/homegate
 
 
 -- 
 Stephen [kiwin] Palm   Ph.D.  E:  p...@kiwin.com
 Senior Technical Director T: +1-949-926-PALM
 Broadcom Broadband Communications Group   F: +1-949-926-7256
 Irvine, California   W: http://www.kiwin.com
 Secondary email accounts:  stephenp...@alumni.uci.edu  p...@broadcom.com
 s.p...@ieee.org  p...@itu.ch  sp...@cs.cmu.edu  p...@ics.t.u-tokyo.ac.jp
 
 ___
 homegate mailing list
 homeg...@ietf.org
 https://www.ietf.org/mailman/listinfo/homegate

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [77all] No Host for IETF 77

2010-03-28 Thread Mark Townsley

On 3/23/10 2:08 PM, Jari Arkko wrote:


I propose $40 for a seat at the table in the front of the meeting 
rooms, $20 for a seat toward the front with extra legroom and $100 
for an exit row.


Ability to escape seems most valuable ;-) Maybe we could also work out 
something based on premium Internet access ($29.90/day) vs. ability to 
read Internet drafts and other ietf.org content (free).

Or, charge for IPv4 access and let IPv6 access be available for free.

- Mark


Jari

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-cheshire-dnsext-dns-sd (DNS-Based Service Discovery) to Informational RFC

2008-11-15 Thread Mark Townsley

Dave Cridland wrote:

On Tue Nov  4 14:28:19 2008, The IESG wrote:

The IESG has received a request from an individual submitter to consider
the following document:

- 'DNS-Based Service Discovery '
   draft-cheshire-dnsext-dns-sd-05.txt as an Informational RFC


I note that this document is Informational, yet forms the basis for 
standards track documents both in the IETF and other SDOs.
Thank you for your review. Can you point me to any standards track IETF 
documents which might need normative reference to this document?


- Mark
It would be, therefore, more useful to tidy up this document and move 
it to the standards track rather than short-cutting it to an 
Informational.


In the course of reviewing XEP-0174 changes for the XSF, I reviewed 
this document in detail, particularly on the subject of record 
formatting. The following are my own views, however, not those of the 
XSF.


I believe the document is exceedingly unclear, and as such unsuitable 
for publication in its present form. It is badly laid out, and 
contains a mixture of specification, rationale, marketing, and 
confusing reiteration of other documents, making the document much 
harder to extract useful information from than it needs to be.


I'm also unconvinced that this represents the state of the protocol as 
deployed by various Apple devices anyway. If this is to be a serious 
attempt to document a working protocol, it must reflect reality.


Section by Section:

1) The last two paragraphs of the Introduction can largely be snipped.

2) Use of RFC 2119 language in an Informational document is a curious 
one - I'm not against its use, but in general terms, the document does 
not appear to use these terms in quite the way I'd expect. In 
particular, the terms appear to be used to express designer's 
preferences rather than actual interoperability requirements.


3) Seems okay.

4) Okay.

4.1) The parenthesis in the second paragraph is superfluous - one 
expects that any reader would surely understand DNS to this level.


From about the top of page 6, however, it gets really bad. Only the 
top paragraph, diagram, and first two sentences of the subsequent 
paragraph are needed here. The rest of the page is waffle and repetition.


Page 7 is mostly okay - it could probably be condensed.

I'd question the purpose of Punycode here, though, if the records are 
already usefully deployed in UTF-8, since the records are only to be 
found by querying in the first place. Is this actually supported in 
the field? (As in, do clients try punycode?)


4.2) I'm always a little wary of UI detail in IETF documents, but the 
suggestions seem reasonable.


4.3) As near as I can tell, the backslah-escaping of DNS-SD instance 
names is done externally as well as internally, so this section is 
exceedingly misleading.


4.4) Appears to be largely marketing, or rationale, and is confusing 
in this section.


4.5) Appears to be largely rationale.

5) Reiterates SRV

6) Okay, although I don't understand the point of mandating an empty 
TXT record, it being about the only portion of the document not backed 
up by twenty-five pages of rationale including words like 
compelling. I'm guessing it might be to avoid negative caching, thus 
placing the statement This service has no parameters under the 
control of normal TTL, etc. That would, naturally, be a compelling 
reason.


It's a shame that several TXT records for services are absent on 
dns-sd.org, then, but it's only a SHOULD - ho, ho.


6.1) Massively confusing, since it reiterates RFC 1035 in such a way 
that without referring to RFC 1035 to gain the context, one is led to 
believe that the actual strings must follow this format, instead of it 
merely being wire format.


6.2) All jolly good, although I note that several Apple devices appear 
to use a single TXT string containing a comma seperated list of 
values, that is, if you forgive my pseudo-ABNF:


txt_value = txt_record
txt_record = keypair [, keypair]

Instead of the apparent specification:

txt_value =  / (1*txt_record)
txt_record = keypair

I wonder whether this is an earlier version of the specification, or a 
non-standard usage of a non-standard, or whether even Apple people 
can't glean the single useful fact from this entire page of prose.


6.3) Astonishingly, this section is reasonably concise, and contains 
information which is, dare I say it, useful. Thankfully it, too, 
appears to be ignored by various Apple devices.


6.4) This section could usefully be folded into 6.2, and the resultant 
prose condensed into perhaps a paragraph or two, and potentially use 
ABNF for clarity:


keypair = key [= value]
key = 1*key_char
key_char = %x20-%x3C / %x3E-%x7E
value = *OCTET

6.5) I seem to have inadvertantly included much of this in my ABNF 
above in 6 characters. The last two paragraphs seem superfluous - 
specifications for debugging tools?


6.6) Describes the wire format, which strikes me as very much less 
than useful. Again, I've seen 

Re: [BEHAVE] Can we have on NAT66 discussion?

2008-11-13 Thread Mark Townsley

Eric Klein wrote:

Mark,
 
I agree with the sentiment, the problem is that the 5 different groups 
are doing different things that all relate back to NAT in v6 (rather 
than just coexistence) each under their own charter.
 
I have had suggestions that I bring this to ietf or inter-area mailing 
lists for general consensus on a need and IETF overall position prior 
to defining a solution.
Behave seems a little limited in scope for the decision about do we or 
don't we want to allow any form of native mode NAT into v6.
I agree, and it is not behave's place to make that decision at this 
time. I had originally proposed that this be discussed in int-area (if 
nothing else because behave's plate is rather full), but some folks 
pointed out that some modes may have affects on applications and that 
behave was best able to determine that, particularly within context of 
the other NATxy work. I'm looking forward to that assessment. So for now 
this should remain discussion to understand the problem space and 
potential solution space better, not a final referendum on whether or 
not the IETF is going to charter work in or otherwise endorse NAT66 in 
any manner.


Thanks,

- Mark
 
Eric
On Thu, Nov 13, 2008 at 12:09 PM, Mark Townsley [EMAIL PROTECTED] 
mailto:[EMAIL PROTECTED] wrote:



I would prefer not to have the same discussion again and again in
multiple places. Let's just try and stick to behave for the
moment, though at some point if the work continues it would need
to be passed around elsewhere. We are not chartering the work one
way or another at the moment, for now this is merely discussion
of the topic.

- Mark





Margaret Wasserman wrote:


Hi Eric,

According to the ADs and WG chairs, the correct forum for the
NAT66 discussion is the BEHAVE WG.  So, let's discuss it there.

Margaret

On Nov 12, 2008, at 9:44 AM, [EMAIL PROTECTED]
mailto:[EMAIL PROTECTED] wrote:

Cross posted to several lists
Can we keep the NAT66 discussion to less than WGs at a time?
I am trying to keep up with multiple threads on this and
trying to explain that we do not have a valid requirement
for NAT66 defined on any of the mailing lists (v6OPS,
BEHAVE, Softwires, RRG, and now v6).
Le's get this to one group (maybe we need a new mailing
list just for NAT66 discussions, but this is getting out
of hand.
Until now the simple response is that the IETF does not
support NAT in the v6 architecture. If this needs
changing lets do it right with proper gap analysis and
needs assessment, and then seeing if there is a solution
(several have been proposed that are not NAT) or if we
need to create one, and if those fail then see about
changing the architecture of IPv6.
Eric ___
Behave mailing list
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]
https://www.ietf.org/mailman/listinfo/behave


___
Behave mailing list
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]
https://www.ietf.org/mailman/listinfo/behave


___
Behave mailing list
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]
https://www.ietf.org/mailman/listinfo/behave




___
Behave mailing list
[EMAIL PROTECTED]
https://www.ietf.org/mailman/listinfo/behave
  


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART Last Call Review of draft-ietf-mipshop-cga-cba-02.txt

2007-02-01 Thread Mark Townsley

Christian Vogt wrote:

Eric -

  

For some reason, in your response, my bulletization of the
list of the new status codes somehow got re-paragraphed -
hopefully my version below does not suffer the same fate.



Oh, no, this was probably one of my Thunderbird extensions for nicer
quotations.  It's now deinstalled.

Anyway, your suggested bulletization is fine in your emails and I got
your point.

  
Typographical resets should be absolutely disallowed in 
E-Mail.  :-)


To the casual reader, it may otherwise be unclear exactly
what change I was suggesting...



Yes.

Will incorporate your suggestions into the draft ASAP.  Thanks!
  
I moved the state to revised id needed for now, if you get the new draft 
in my 2/15 I should be able to get this on the 2/22 telechat.


Thanks,

- Mark

- Christian

  


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Gen-ART review of draft-ietf-l2tpext-failover-11.txt

2007-01-30 Thread Mark Townsley


Sorry for the spam folks, I responded to the wrong thread.

Mark Townsley wrote...

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Gen-ART review of draft-ietf-l2tpext-failover-11.txt

2007-01-30 Thread Mark Townsley


On second look, this is rather small. Vipin, I can do either. If you 
wish to provide me text in OLD NEW format, or a new document.


- Mark

Suresh Krishnan wrote:

I am the assigned Gen-ART reviewer for
draft-ietf-l2tpext-failover-11.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is basically ready for publication, but has nits
that should be fixed before publication.

Comments:

Minor:
==

* IANA considerations

The IANA considerations section does not specify the namespace from 
which allocation is requested for the AVPs and the message types.



Editorial:
==

* Section 4.2 Failover Session Response

This sentence has a typo and does not read well

It is not required to respond one FSQ message with just on FSR.

I suggest removing it altogether so that the text will simply read

An endpoint MAY choose to respond to an FSQ message with multiple FSR
 messages



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'A Lightweight UDP Transfer Protocol for the the Internet Registry Information Service' to Proposed Standard (draft-ietf-crisp-iris-lwz)

2006-08-17 Thread Mark Townsley

Sam Hartman wrote:

I notice that this transport provides no authentication of the data
that is retrieved.

The security considerations needs to discuss the potential attacks if
an attacker modifies this public data.  The security considerations
section also needs to point to best practice for avoiding UDP
reflection attacks.  It is not good enough to say Do what other
people do.


In both cases these may be included by reference.
  


I noticed this in the draft:

   1.  If a request requires authentication, confidentiality, or other
   security, use another transfer protocol.

It seems to me that the intent is to not provide authentication here. This 
seems more fundamental than a fix by reference.

In a different vein, we have:

  Its message exchange
  pattern is simple: a client sends a request in one UDP packet, and a
  server responds with an answer in one UDP packet.

I see no mention of what to do if the one UDP packet is lost. 
Resend? After how long? Exponentially backoff? 


- Mark



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Announcement of IAB member selection

2006-04-03 Thread Mark Townsley



Henrik Levkowetz wrote:

I applaud the NomCom in this very appropriate choice -- at this particular
time, I don't think there is any better choice they could possibly have
made for the vacant IAB seat.  Bert has impressed me with his ability to
always perceive where he is most needed, and appear there as if by magic
to assist in whatever needs to be done.  I remember a thorny throughput
issue we ran across some years ago at Casa de Bandini, when Bert came
through as a trouper and helped us make headway with the problem [1].  With
that taken care of, he also showed us his famous ability to make friends
with the ladies [2].

We couldn't wish for a more well-rounded man of the world to step up to
the plate and shoulder his responsibilities today.


Henrik


[1] http://tinyurl.com/jfsxm
[2] http://tinyurl.com/zccdt


Or...

http://bert.secret-wg.org/Kisses/





on 2006-04-01 04:15 Ralph Droms said the following:


I am pleased to announce that the 2005-2006 NomCom selection and
confirmation process to fill the IAB seat vacated by Pekka Nikander's
resignation is complete.  At this time, on behalf of the NomCom, the
new member of the IAB is:

Bert, [EMAIL PROTECTED]

Bert will complete the remainder of Pekka's term.  The Nomcom
considered Bert's extensive travel and acquaintances with leaders and
personalities around the world.  Although there was question about
Bert's technical accomplishments, his other experience will materially
help the IAB with its representational duties.  The NomCom was also
concerned about Bert's willingness to contribute to IAB activities as
Bert is usually a silent participant in public events.  However, we
note the eloquence and clarity of reasoning Bert demonstrated on video
at IETF 65 in his congratulation to the IETF on its 20th anniversary.

A further consideration is whether Bert would be able to serve a full
term, as it has been rumored he is a candidate to replace Vint Cerf as
chair of ICANN when Vint's term expires.  His photograph count is
approaching Vint's and he has accumulated a similar number of frequent
flyer miles.  Bert was not able to commit, but indicated he has not
yet been offered the ICANN role.

The NomCom joins the rest of the IETF community in thanking Bert for
volunteering his valuable time and extraordinary skills to the IAB,
the IETF comunity and the Internet.

- Ralph Droms (chair), for the 2005-2006 IETF Nominating Committee
 April 1, 2006

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Softwires Interim Meeting

2006-01-24 Thread Mark Townsley

Marshall Eubanks wrote:


March 19 - 30 days = Feb 17th.


This date was chosen, understanding that it bends the rules a bit, to 
increase the greater goal of global participation by coinciding with the 
APRICOT conference the following week (so at least some of the 
non-asiapac members will be on the correct side of the globe).


- Mark



On Jan 24, 2006, at 4:19 PM, James M. Polk wrote:


Mark

I'm not an interested party here, and I don't mean to throw a  monkey 
wrench into your plans, but I'm observing that this seems to  be 
within the 30 days of moratorium of when we cannot have an  interim, 
where (loosely) 'interims shall not be within 30 days of  the next 
IETF meeting'.


The Dallas IETF starts on March 19th, so I would think the cutoff  
would be Feb 19th for the last of an interim.  What am I missing?


At 03:38 PM 1/24/2006 -0500, Mark Townsley wrote:

The meeting will be Feb 23-24 in Hong Kong. Participants should  
plan to
arrive Feb 22 for an early start on Feb 23. We will finish by 2pm  
on Feb

24. Accomodation information coming shortly (watch the
[EMAIL PROTECTED] mailing list).

Thank you,

- Mark

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Softwires Interim Meeting

2006-01-24 Thread Mark Townsley
The meeting will be Feb 23-24 in Hong Kong. Participants should plan to 
arrive Feb 22 for an early start on Feb 23. We will finish by 2pm on Feb 
24. Accomodation information coming shortly (watch the 
[EMAIL PROTECTED] mailing list).

Thank you,

- Mark

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Is there a per-wg chair email list maintained?

2005-06-07 Thread W. Mark Townsley


i.e., [EMAIL PROTECTED], [EMAIL PROTECTED], etc. in order to reach the 
current WG chairs for just that WG.


Thanks,

- Mark

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: (oops) Is there a per-wg chair email list maintained?

2005-06-07 Thread W. Mark Townsley


Sorry for spamming the world with this, I meant to just ask [EMAIL PROTECTED]

- Mark

W. Mark Townsley wrote:



i.e., [EMAIL PROTECTED], [EMAIL PROTECTED], etc. in order to reach 
the current WG chairs for just that WG.


Thanks,

- Mark



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: L2TP Deployment Scenario?

2004-03-19 Thread W. Mark Townsley


Rohit Gupta wrote:

Hi,
 

L2TP is an encapsulation that allows multiplexing of multiple PPP sessions 
between two IP-connected endpoints, and a control protocol for dynamically 


Since L2TP is so strongly tied with PPP, can i assume that it will be *mostly* used 
when a user
dials (ISDN/modem) into the ISP network (LAC) to contact the corporate network.
It tends to be used rather often for PPPoA and PPPoE in DSL environments these 
days as well.

Can I then connect a small branch office to the corporate network using L2TP? Does it make any
sense doing that. 
Sure, in some cases.

 I am now talking of a deployment scenario. Do you ever have two branches
connected via L2TP? 
A number of small routers on the market today have the ability to initiate an 
L2TP session from the router to an LNS.

 I searched the internet and found only scenarios wherein a remote access user
dials into the ISP to access the corporate network using L2TP. Is the former possible?
Look for L2TP voluntary tunneling or client-initiated L2TP

Also, if you are going to be running L2TP over the Internet and you are worried 
about folks hacking the connection, you would want to secure the L2TP tunnel 
with IPsec transport mode as defined in RFC3193.

In theory, one could have a small office with some  10 users connected to switch 
which in turn
dials into the ISPs network. Is this possible?
If you are using L2TP over IP to connect to an ISP to get IP access you likely 
have a bit of a chicken and egg problem.

But, yes, if you already have IP connectivity from one ISP, but want to use L2TP 
to connect to another ISP (perhaps with some other value add on their network) 
it is *possible* if the ISP allows L2TP connections from your router. Typically, 
an ISP would accept L2TP connections only from a wholesale access provider (or 
in some cases from their own PC client). In any case, you'd probably have to 
find a very knowledgable person at your ISP to talk to this about as it likely 
isn't standard practice.

- Mark

With regards,
Rohit
P.S.
And thanks to everybody for responding both on the list and offline!


__
Do you Yahoo!?
Yahoo! Mail - More reliable, more storage, less spam
http://mail.yahoo.com





Re: GRE and L2TP

2004-03-19 Thread W. Mark Townsley


Stewart Bryant wrote:



W. Mark Townsley wrote:

Rohit Gupta wrote:

Hi,

What is it in L2TP that i cant do with a simple GRE tunneling when 
implementing a remote access
VPN for a mobile client to connect to the corporate network. In L2TP, 
since it uses PPP
end-to-end, the LNS is able to supply dynamic IP address using IPCP 
to the remote client. LNS
takes this IP address from a pool of IP addresses it has. If one were 
to use GRE, then the same
can be done by using some out-of-band mechanism (or even have a fixed 
IP address which the mobile
client is instructed to use). GRE will tunnel the data packet 
originated from the mobile client,
the inner IP header will have the ip addresses as assigned by the 
corporate network. The outer IP
header will contain the IP address of teh ISP and the gateway to 
reach the corporate network.


GRE is an encapsulation. If you can manually provision or have some 
other out of band mechanism that does everything L2TP and PPP would 
otherwise do for you, then by all means use GRE - or IP in IP for that 
matter as your scenario with fixed IP addresses for all mobile clients 
(which I would think is a showstopper from the start) does not obviate 
the need for a GRE shim either.

L2TP is an encapsulation that allows multiplexing of multiple PPP 
sessions between two IP-connected endpoints, and a control protocol 
for dynamically establishing and maintaining the emulation of these 
PPP sessions. This is very different than GRE (though there are some 
ways to deploy L2TP between two routers to make it look like it is 
doing what GRE typically does in a bit more of a dynamic manner, 
though this is really a subset of L2TP's overall functionality).

Since you indicate that this is for a mobile environment, you might 
want to look at using Mobile IP.

My whole point is that i want to know as to what is the burning need 
to have L2TP!


This question probably has more to do with whether you need PPP. If 
you do, L2TP could work for you to transport that PPP session (or many 
PPP sessions) over an IP network. If not, I see no reason for you to 
be burning with need for L2TP!

- Mark

Mark

I think that the correct comparison in Rohit's case is not
between L2TP and GRE, but between L2TPv3 and GRE. As we both
know L2TPv3 is better suited to VPN apps than GRE because of
its highly functional control plane, and mild security
enhancements.
I was under the impression during this thread that Rohit was referring to L2TP 
as defined in RFC2661, not L2TPv3 (currently 
draft-ietf-l2tpext-l2tp-base-11.txt) which is certainly not so closely tied to PPP.

Thanks,

- Mark

- Stewart

Regards,
Rohit
P.S.

Am not sure if this is indeed the right place to ask this question. 
But since there will be a lot
of experienced people on this list who would have worked on both 
these protocols, replying to this
one should be very easy.

__
Do you Yahoo!?
Yahoo! Mail - More reliable, more storage, less spam
http://mail.yahoo.com












Re: GRE and L2TP

2004-03-18 Thread W. Mark Townsley
Rohit Gupta wrote:

Hi,

What is it in L2TP that i cant do with a simple GRE tunneling when implementing a 
remote access
VPN for a mobile client to connect to the corporate network. In L2TP, since it uses PPP
end-to-end, the LNS is able to supply dynamic IP address using IPCP to the remote 
client. LNS
takes this IP address from a pool of IP addresses it has. If one were to use GRE, then 
the same
can be done by using some out-of-band mechanism (or even have a fixed IP address which 
the mobile
client is instructed to use). GRE will tunnel the data packet originated from the 
mobile client,
the inner IP header will have the ip addresses as assigned by the corporate network. 
The outer IP
header will contain the IP address of teh ISP and the gateway to reach the corporate 
network.
GRE is an encapsulation. If you can manually provision or have some other out 
of band mechanism that does everything L2TP and PPP would otherwise do for you, 
then by all means use GRE - or IP in IP for that matter as your scenario with 
fixed IP addresses for all mobile clients (which I would think is a showstopper 
from the start) does not obviate the need for a GRE shim either.

L2TP is an encapsulation that allows multiplexing of multiple PPP sessions 
between two IP-connected endpoints, and a control protocol for dynamically 
establishing and maintaining the emulation of these PPP sessions. This is very 
different than GRE (though there are some ways to deploy L2TP between two 
routers to make it look like it is doing what GRE typically does in a bit more 
of a dynamic manner, though this is really a subset of L2TP's overall 
functionality).

Since you indicate that this is for a mobile environment, you might want to look 
at using Mobile IP.

My whole point is that i want to know as to what is the burning need to have L2TP!
This question probably has more to do with whether you need PPP. If you do, L2TP 
could work for you to transport that PPP session (or many PPP sessions) over an 
IP network. If not, I see no reason for you to be burning with need for L2TP!

- Mark

Regards,
Rohit
P.S.

Am not sure if this is indeed the right place to ask this question. But since there 
will be a lot
of experienced people on this list who would have worked on both these protocols, 
replying to this
one should be very easy.
__
Do you Yahoo!?
Yahoo! Mail - More reliable, more storage, less spam
http://mail.yahoo.com





Re: PPP

2002-03-11 Thread W. Mark Townsley



Brian Lloyd wrote:
 
 At 11:59 PM 3/6/2002, you wrote:
   sigh It has been many years since I argued this with Karl Fox back when
   he chaired the L2TP WG.
 
 Karl chaired only the pppext WG.
 
 Then at the time L2TP or the precursor discussions were done within the
 PPPEXT WG because the discussion was with Karl.
 
   At that time he agreed but also said that there
   was too much water under the bridge to fix L2TP at that time so it was
   going to go forward in its subtlely-broken form.  I haven't looked at it
   since then.  I don't even remember the lexicon so I will undoubtedly sound
   uninformed.
  
   The LCP negotiation should take place with the L2TP equivalent of the
   NAS.  That is independent of anything else that happens and nothing
   associated with that needs to be communicated to the edge device at the
   target network.  The authentication phase then takes place so you can do
   authorization and configuration.
 
 That would have been nice, but, the requirements were that it be possible for
 user authorization be completed at the LNS (the edge device at the target
 network), and at the LAC (NAS).
 
 Thank you for reminding me.  LNS and LAC were the terms I was looking for.
 
 WRT authentication, there is no reason not to do it in both places.  Let
 the protocol carry the information.
 
 In addition, we could not require the user to
 enter a username and password twice. You simply had to be able to drop in
 L2TP, and everything look the same as it did before to the end user.
 
 I agree that is the more desirable scenario.
 
   Once that is complete you can do the
   MLPPP and NCP negotiation(s) because then and only then do you know what
   the end system is authorized to do.
 
 Yup, that would have been nicer.
 
 Yes, it would.
 
   But MLPPP is negotiated during LCP, you say!  Right.  That is broken and
   I helped make it broken and, in retrospect, I am *really* sorry I did.
 
 That's OK, we'll forgive you ;-)
 
 Thank you.  It may seem silly but that has really bugged me for a number of
 years.  I hate the thought of having done flawed work.
 
 Barring redesign of PPP, getting around the wrong things being located in
 the LCP negotiation would have been made a little easier if we had been
 allowed to go through LCP negotiation twice. So, you could have LCP
 negotiated at the LAC,
 
 But you wouldn't have needed to do LCP negotiation twice.  The LAC
 negotiates LCP because that is the terminus of the link. 

Not just that, the LAC may also need to get authentication information from the
user so that it can know which LNS to forward to. 

 The LAC
 communicates the options negotiated back to the LNS.  

That's what we do now. Please read section 4.4.5 of RFC2661.

 Remember, the LCP
 options negotiate only indicate what the client is willing to accept
 therefore it doesn't really matter what it negotiates.  It is just there to
 prevent its peer from sending something it can't handle.

But, if the LNS, say, want's to do some different authentication... Say, PAP
with an OTP but the LAC negotiated CHAP, then, well... We have to start over PPP
LCP, which should be OK except that it used to break a lot of PPP clients.

 
 forward any necessary link parameters to the LNS so that it could set them
 correctly during LCP round 2, and then renegotiate LCP at the LNS to get
 things like MLPPP and perhaps authentication type which should have been
 designed into the negotiation process later.
 
 Right.  That is the crux of the problem.
 
 But -- and here is the point about broken PPP stacks -- at the time there
 were a lot of PPP stacks which would simply roll over and die if you tried
 to reneogtiate LCP after you had already begun (yes, in great violation to
 what it says in RFC 1661). This wasn't discovered until L2TP came along
 because before that, you really didn't see LCP renegotiation occur very much.
 
 sigh But we did know.  The argument was that it took too long to
 negotiate PPP as it was so anything we did to speed it up was necessary.  I
 have kicked myself for caving in to that argument for many years now.

Then let me give you a collective kick from all of the l2tp developers out there
;-)

I thought it was just a bug. I remember telling Robert Webster about this little
problem at a pacbell bakeoff many years ago. His jaw dropped, and he went back
and made an on-the-fly bugfix for it and afterwards it worked great. Note that
Robert worked at Shiva then, and maintained code for the PPP stack that for a
while was the original code base for much of the dialup client industry (e.g.
Windows, OS/2, and probably some others...).

 
 But, it was way too late as there were so many clients in the field with
 this bug. So, we ended up with Proxy LCP and Proxy Authentication like you
 see them today.
 
 I know: add more ugliness in order to deal with other ugliness.  I
 preferred the old days where people found problems, fixed them, and the
 fixes then found their ways into new versions, 

Re: PPP

2002-03-06 Thread W. Mark Townsley



Brian Lloyd wrote:
 
 At 03:12 AM 3/4/2002, you wrote:
 I couldn't say it shorter and more clearly than Vint : PPP does NOT belong
 to the TCP/IP protocol suite.
 
 Other than it was designed for IP and the other stuff came along for the
 ride.  PPP was a relatively early product of the IETF and specifically
 designed for IP.
 
 It's a Layer 2(*) protocol, intended to carry multiple Layer 3 protocols
 (like IP, IPX,...) over a point-to-point connection (like PSTN, ISDN,...).
 
 PPP succeeded SLIP by bringing extended features : SLIP could only
 encapsulate IP while PPP can encapsulate several protocols, PPP supports
 authentication while SLIP didn't, etc.
 
 Remember that TCP/IP only covers Layer 3 up to Layer 7 : it's designed to
 be implemented on existing lower layers (1 and 2) :  LAN (Ethernet, Token
 Ring, Wireless Lans,...) or WAN (ISDN, ATM, Frame Relay,...).
 
 This is a common misconception.  The lower layers (1 and 2) that you
 mention are often completely routable networks in and of themselves.  You
 can even encapsulate IP within IP therefore IP is operating at layer 2 from
 that interpretation.  Ethernet is regularly routed now (people call it
 switching but a rose by any other name ...).  So all of these, including
 PPP, exist at layers 1-2 in the TCP/IP model (link, network, internetwork,
 transport, application) or layers 1-3b in the ISORM.
 
 This problem plagues developers working with PPP for the first time because
 they keep thinking in terms of PPP being only a link-layer protocol.  If
 they would remember that PPP operates at the network layer then they would
 stop making stupid mistakes like a badly-designed L2TP.

I don't see how classification of PPP as a layer 2, layer 3, or any other layer
would have had an affect on how we designed L2TP (perhaps it would have affected
the name of the protocol though). Layers aside, PPP was already deployed and it
was pretty obvious what we wanted to do - make it run over IP without the
installed base of PPP clients being made aware of it. How would you have done
this that is substantially different than L2TP? (As an aside, of the list of
obscene things we did have to do to make L2TP work, the worst were more due to
badly implemented PPP stacks than anything else.)

Tunneling, particularly L2 tunneling, is by its very definition a layer
violation. The perfect world where this is not necessary or desirable does not
exist beyond textbooks and laboratories. So here we are in the real world,
tunneling not just PPP but a plethora of L2 or L2-like layers. 

- Mark

 
 E.T.
 
 (*) Those layers always refer to the OSI model. Think of a Layer 2 or 3 or
 4 Switch : it doesn't depend on the protocol suite above, so we always
 refer to the vendor- technology- protocol-independent OSI reference model.
 
 I love watching people slavishly adhere to this or that model of
 layering.  Layering is a convenience, not a religion.  (Actually, I got
 that backwards.)  With the widespread use of encapsulating one networking
 or internetworking protocol in another, the whole concept of rigid layering
 goes out the window.  The cry of, its a network layer; its a link layer,
 should be right up there with, its a dessert topping; its a floor wax!
 
 --- The basic answer ends here ---
 
 Now a small yet technical recall : when data comes from an application to
 be transported on a physical medium (copper cable, fiber optics, radio
 waves, infra-red,...), on its way from Layer 7 to Layer 1 it reaches IP
 (Layer 3)
 
 ISO spent a lot of time trying to sell the 7-layer model and then didn't
 know how to backtrack when they discovered that there were really two
 network layers when you interconnect dissimilar networks using an
 internetworking protocol.  ATM, FR, Ethernet, etc., are all routable
 layer-3 protocols in their own regard so they opted to break layer three
 into three sublayers. (It is really three layers by their reckoning but ISO
 already had so much invested in the ISO Seven Layer Reference Model [tm]
 that they couldn't really switch to the ISO Nine Layer Reference Model
 Formerly Known As The Seven Layer Reference Model [tm].)
 
 that encapsulates it in a datagram/packet and specifies the destination
 network+host address. Then it's forwarded to PPP (Layer 2) that
 encapsulates it in a frame and specifies the way bits are organized to
 travel through the physical medium. Then it's forwarded to some Layer 1
 technology that converts the bits into a specific signal using a specific
 encoding scheme (V.90 on PSTN, I.430 on ISDN BRI,...) and finally reaches
 the physical medium to be physically transported through the network.
 
 To some extent you are right but your model needs to accommodate things
 like L2TP which tunnels traffic at layer 1|2 (depending on the model of the
 day) in a layer 4 (transport) protocol, or IP tunneled in IP.  It is
 probably better to be able to keep the concept of duality in your mind,
 i.e. when you hold you tongue one way it 

Re: PPP

2002-03-06 Thread W. Mark Townsley



Brian Lloyd wrote:
 
 At 02:42 AM 3/6/2002, you wrote:
 I don't see how classification of PPP as a layer 2, layer 3, or any other
 layer
 would have had an affect on how we designed L2TP (perhaps it would have
 affected
 the name of the protocol though).
 
 PPP actually consists of two distinct and separate sets of protocols.  The
 LCP and its negotiation should be totally separate from the NCPs and their
 negotiation.
 
 Layers aside, PPP was already deployed and it
 was pretty obvious what we wanted to do - make it run over IP without the
 installed base of PPP clients being made aware of it.
 
 Do it right would not have changed that.
 
 How would you have done
 this that is substantially different than L2TP? (As an aside, of the list of
 obscene things we did have to do to make L2TP work, the worst were more due to
 badly implemented PPP stacks than anything else.)
 
 sigh It has been many years since I argued this with Karl Fox back when
 he chaired the L2TP WG.  

Karl chaired only the pppext WG.

 At that time he agreed but also said that there
 was too much water under the bridge to fix L2TP at that time so it was
 going to go forward in its subtlely-broken form.  I haven't looked at it
 since then.  I don't even remember the lexicon so I will undoubtedly sound
 uninformed.
 
 The LCP negotiation should take place with the L2TP equivalent of the
 NAS.  That is independent of anything else that happens and nothing
 associated with that needs to be communicated to the edge device at the
 target network.  The authentication phase then takes place so you can do
 authorization and configuration.  

That would have been nice, but, the requirements were that it be possible for
user authorization be completed at the LNS (the edge device at the target
network), and at the LAC (NAS). In addition, we could not require the user to
enter a username and password twice. You simply had to be able to drop in L2TP,
and everything look the same as it did before to the end user. 

 Once that is complete you can do the
 MLPPP and NCP negotiation(s) because then and only then do you know what
 the end system is authorized to do.

Yup, that would have been nicer.

 
 But MLPPP is negotiated during LCP, you say!  Right.  That is broken and
 I helped make it broken and, in retrospect, I am *really* sorry I did.

That's OK, we'll forgive you ;-)

Barring redesign of PPP, getting around the wrong things being located in the
LCP negotiation would have been made a little easier if we had been allowed to
go through LCP negotiation twice. So, you could have LCP negotiated at the LAC,
forward any necessary link parameters to the LNS so that it could set them
correctly during LCP round 2, and then renegotiate LCP at the LNS to get
things like MLPPP and perhaps authentication type which should have been
designed into the negotiation process later. But -- and here is the point about
broken PPP stacks -- at the time there were a lot of PPP stacks which would
simply roll over and die if you tried to reneogtiate LCP after you had already
begun (yes, in great violation to what it says in RFC 1661). This wasn't
discovered until L2TP came along because before that, you really didn't see LCP
renegotiation occur very much. But, it was way too late as there were so many
clients in the field with this bug. So, we ended up with Proxy LCP and Proxy
Authentication like you see them today. There's not much else you can do if you
want to complete PPP negotiation at the LNS, but *start* it at the LAC so that
you can get the @domain portion of the username to determine where to tunnel
the user. Sigh... Yes, if we had thought about running PPP over IP from the
beginning, things might have looked very different in general... A more seperate
link layer negotiation would have been one of them. But, PPP isn't nearly as
difficult as, say, TDM over IP ;-)

There are even other bugs in the field we have had to code around with IPCP
negotiation, and don't even get me started on ACCM mapping

 
 So, as I said, this is water under the bridge and it isn't going to
 change.  Any attempt to do so would be met with a barrage of but we have
 lots of systems in the field and this would break them arguments.

Right. The same argument that led to some of the choices we had to make in L2TP.

 
 Tunneling, particularly L2 tunneling, is by its very definition a layer
 violation. The perfect world where this is not necessary or desirable
 does not
 exist beyond textbooks and laboratories. So here we are in the real world,
 tunneling not just PPP but a plethora of L2 or L2-like layers.
 
 There is nothing wrong with tunneling per-se.  In fact, it solves many
 problems.  IMHO tunneling is a good thing.  My comments had only to do with
 the fallacy of rigid layering, how many people don't really understand
 layering, and as a side issue, how PPP was really a suite of protocols at
 different layers and how that affects MLPPP and L2TP.

Then we agree more than we 

Re: IETF #53 Schedule Stability

2002-02-26 Thread W. Mark Townsley



Pekka Savola wrote:
 
 On Mon, 25 Feb 2002, W. Mark Townsley wrote:
   What most people seem to be missing is the real work is done outside of
   the WG meetings.  You can quite well participate in the IETF process
   without ever (or once or twice a year) being present.  Personally, in some
   wg's I've been to, a lot of MIC time is used by people who 1) like their
   own voice, and/or 2) haven't read the drafts.
 
  You don't have to present works for them to be adopted as WG items.
 
  Presenting a work does, sometimes, help the WG chair(s) determine interest level
  and consensus of the WG, particularly if the issue is contentious and the right
  people are present at the meeting (e.g. people who have read the draft and
  care). So, while it can help the author's cause to present, it is not (nor ever
  has been that I know of) a requirement.
 
 Well, I haven't been around all that many years, but I don't recall a
 single case in a few WG's I'm participating that an unpresented work would
 have been adopted.. sure, it's not written down anywhere, but sometimes
 custom is stronger than law...

It could certainly be the convention of the WG Chairs in those (or even most)
groups. But, it is still not an IETF mandate.

Cheers,

- Mark

 
 --
 Pekka Savola Tell me of difficulties surmounted,
 Netcore Oy   not those you stumble over and fall
 Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords




Re: IETF #53 Schedule Stability

2002-02-25 Thread W. Mark Townsley



Pekka Savola wrote:
 
 On Sun, 24 Feb 2002, Eric Burger wrote:
 [snip]
  While it's true that one should try to see everything, it's hard to
  imagine, for example, how a junior engineer working on an implementation of
  wireless ad-hoc networks has much of an interest in ENUM.
 [snip]
 
 What most people seem to be missing is the real work is done outside of
 the WG meetings.  You can quite well participate in the IETF process
 without ever (or once or twice a year) being present.  Personally, in some
 wg's I've been to, a lot of MIC time is used by people who 1) like their
 own voice, and/or 2) haven't read the drafts.
 
 If you want a focused view, participation isn't necessary.  (An IMO stupid
 remnant here is that you have to present the works if they're to be
 adopted as WG items.) 

You don't have to present works for them to be adopted as WG items.

Presenting a work does, sometimes, help the WG chair(s) determine interest level
and consensus of the WG, particularly if the issue is contentious and the right
people are present at the meeting (e.g. people who have read the draft and
care). So, while it can help the author's cause to present, it is not (nor ever
has been that I know of) a requirement.

 If you want a general view (perhaps in addition to
 the focused one), coming to the meetings might help.
 
 --
 Pekka Savola Tell me of difficulties surmounted,
 Netcore Oy   not those you stumble over and fall
 Systems. Networks. Security.  -- Robert Jordan: A Crown of Swords