Re: paralysis

2004-03-07 Thread Paul Hoffman / IMC
At 3:03 PM -0800 3/7/04, Michael Thomas wrote:
From what I can tell, anything that falls
short of perfection then gets summarily
executed.
The majority of the anti-spam proposals being actively discussed 
are variants on the prove the sender is who he says he is. None of 
these are perfect, yet:

- they are being actively discussed in the ASRG

- they are being actively discussed on the [EMAIL PROTECTED] mailing list

- there was a BOF about them last week in Seoul

- some people are creating experimental implementations and looking 
at the results

This seems different than summarily executed.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: visa requirements (US citizens)

2004-01-28 Thread Paul Hoffman / IMC
At 10:46 AM -0800 1/28/04, Kevin C. Almeroth wrote:
 The Korean embassy page that is linked to from the IETF meetings page
(http://www.koreaembassy.org/visiting/eng_visas.cfm) makes it
pretty darn clear that US folks should get a visa. They do have a
link from that page saying how wonderful US-Korea relations are, of
course.
What part are you reading that says this?

# You may enter Korea without a visa for a stay up to 30 days
or less for tourism, visiting, or transit to another country when
carrying a valid US passport.
Seems to me to pretty clear that a visa is not needed.
I am not a lawyer, but I don't think attending a professional meeting 
is either tourism, visiting, or transit to another country. 
YMMV.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: visa requirements (US citizens)

2004-01-27 Thread Paul Hoffman / IMC
At 2:31 PM -0500 1/27/04, Steve Bellovin wrote:
I was advised by our corporate travel consultants that I should get a
visa.  Given the current international climate -- there was an article
in last Thursday's Wall Street Journal about how other countries
are retaliating for the current U.S. fingerprinting and visa application
requirements -- this may be a prudent course of action.
The Korean embassy page that is linked to from the IETF meetings page 
(http://www.koreaembassy.org/visiting/eng_visas.cfm) makes it 
pretty darn clear that US folks should get a visa. They do have a 
link from that page saying how wonderful US-Korea relations are, of 
course.

Showing up in the airport without a visa and saying but someone at 
one of your consulates told me I didn't need one may go over as well 
in other countries as it does in the US...

--Paul Hoffman, Director
--Internet Mail Consortium


New mail-ng mailing list open for sign-ups

2004-01-25 Thread Paul Hoffman / IMC
Greetings again. There seems to be more discussion these days about 
replacing SMTP and/or RFC 2822 and/or POP/IMAP for a variety of 
reasons. The discussion seems to pop up on a few different lists and 
in a few different hallways, and it might be good to have a single 
list where folks can congregate. Thus, I have set up a mail-ng 
mailing list.

The first task probably is to determine what the next generation of 
mail should do, and how that is different than what 
SMTP/2822/POP-or-IMAP or instant messaging does. It is safe to say 
that we can ignore actual protocol proposals for many months (if not 
years) until we figure out what is needed. Once we do that, there are 
plenty of protocol people who can attack the decided-on requirements.

There is no expectation that there will be significant agreement on 
the list. It is likely that over time the discussion will split into 
camps of like-minded design goals. The list might then spawn 
different lists for the folks of the different camps (mail-ng-shoe, 
mail-ng-sandal, ...). The list is explicitly not yet meant to be an 
IETF working group yet (if at all), and is probably more akin to the 
IRTF. But at the beginning, it will most likely be talking, not 
research.

See http://www.imc.org/mail-ng/ for information on how to 
subscribe. The list is taking subscriptions now, and will probably go 
live for discussions within a week. Having some discussion on a 
mailing list now should make the dinners and bar gatherings at Seoul 
more interesting.

--Paul Hoffman, Director
--Internet Mail Consortium


New mail-ng mailing list open for sign-ups

2004-01-24 Thread Paul Hoffman / IMC
Greetings again. There seems to be more discussion these days about 
replacing SMTP and/or RFC 2822 and/or POP/IMAP for a variety of 
reasons. The discussion seems to pop up on a few different lists and 
in a few different hallways, and it might be good to have a single 
list where folks can congregate. Thus, I have set up a mail-ng 
mailing list.

The first task probably is to determine what the next generation of 
mail should do, and how that is different than what 
SMTP/2822/POP-or-IMAP or instant messaging does. It is safe to say 
that we can ignore actual protocol proposals for many months (if not 
years) until we figure out what is needed. Once we do that, there are 
plenty of protocol people who can attack the decided-on requirements.

There is no expectation that there will be significant agreement on 
the list. It is likely that over time the discussion will split into 
camps of like-minded design goals. The list might then spawn 
different lists for the folks of the different camps (mail-ng-shoe, 
mail-ng-sandal, ...). The list is explicitly not yet meant to be an 
IETF working group yet (if at all), and is probably more akin to the 
IRTF. But at the beginning, it will most likely be talking, not 
research.

See http://www.imc.org/mail-ng/ for information on how to 
subscribe. The list is taking subscriptions now, and will probably go 
live for discussions within a week. Having some discussion on a 
mailing list now should make the dinners and bar gatherings at Seoul 
more interesting.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: SMTP Minimum Retry Period - Proposal To Modify Mx

2004-01-13 Thread Paul Hoffman / IMC
At 12:48 PM -0500 1/13/04, [EMAIL PROTECTED] wrote:
On Tue, 13 Jan 2004 07:21:53 EST, [EMAIL PROTECTED] (Mike S)  said:

  As I said, fascist.

Godwin.
Valdis, you have confused two protocols that produced similar results 
but used different underlying transports and different signalling.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: Has anybody heard back from the Hotel in Seoul?

2004-01-05 Thread Paul Hoffman / IMC
At 2:39 PM -0600 1/5/04, Pete Resnick wrote:
I got no response (other than an initial e-mail telling me I filled 
out part of the form incorrectly, which I answered by e-mail). After 
hearing nothing, I called them and got a confirmation number. 
Perhaps it is a NACK rather than an ACK protocol?
Not to worry everyone, but I got an ACK via FAX a few days after I 
faxed them my reservation.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: Tag, You're It!

2003-12-17 Thread Paul Hoffman / IMC
At 12:47 PM -0500 12/17/03, John Stracke wrote:
Paul Hoffman / IMC wrote:

At 9:55 AM -0500 12/17/03, John Stracke wrote:

Modifying the Subject: line is a Bad Thing; it invalidates digital 
signatures.
Which digital signatures are you talking about? Neither S/MIME nor 
OpenPGP sign the headers in messages, only the bodies.
S/MIME can sign the Subject: header (see RFC-1848, section 6.3)
RFC 1848 is for MOSS, not S/MIME or OpenPGP. MOSS had no significant 
implementation.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: PKIs and trust

2003-12-14 Thread Paul Hoffman / IMC
At 12:12 PM -0500 12/14/03, Keith Moore wrote:
To further your point, an area completely outside of ICANN's purview, yet an
area requiring governance is PKI. We are at the point where deployment of a
PKI has moved beyond technical issues, becoming almost completely the policy
 politics of trust. Until the politicians broker the trust relationships,
there is nothing technology can do.
since when are politicians trustworthy enough to broker trust relationships?

I'd put this a different way.  Until PKIs are able to represent the 
rich diversity of trust relationships that exist in the real world, 
they are mere curiosities with marginal practical value.
Oh, please. Describe a trust relationship that cannot be represented 
using current PKI technology (PKIX certs, S/MIME signed messages, 
OpenPGP certs, OpenPGP signed messages, or SPKI certs). The lack of 
ability to represent the trust relationship is not what is stopping 
the PKIs.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: PKIs and trust

2003-12-14 Thread Paul Hoffman / IMC
At 2:14 PM -0500 12/14/03, Keith Moore wrote:
I'd put this a different way.  Until PKIs are able to represent 
the rich diversity of trust relationships that exist in the real 
world, they are mere curiosities with marginal practical value.
Oh, please. Describe a trust relationship that cannot be 
represented using current PKI technology (PKIX certs, S/MIME signed 
messages, OpenPGP certs, OpenPGP signed messages, or SPKI certs).
I trust my boss to make statements about my job.
I trust my landlord to make statements about the house I rent from him.
I trust my mother and my siblings to make statements about my 
immediate family.
I trust my mother and my siblings to make statements about the 
identities of other family members.
I trust the State of Tennessee to make statements about the 
identities of state agencies.
I trust state agencies to make statements about which they have 
authority: (e.g. automobile licensing) but not to make statements 
about things that are outside of their purview.
I trust the United States government to make statements about the 
identifies of US government agencies.
I trust US government agencies to make statements about which the 
agency has authority: (e.g. aircraft licensing, federal income tax) 
but not to make statements about things which are outside of their 
purview.
I trust my employer to make assertions about the identities of its 
officers and/or other employees, for the purpose of establishing 
identity for work-related communications, but not for other purposes.

Now if you can show me a tool that will translate statements like 
the above (or other statements that ordinary humans can understand) 
into data structures that existing PKI-based tools will interpret 
reliably and correctly, I'll be extremely impressed.
All of those statements, assertions, and so on can be made in simple 
signed messages. When you get a message with statements about your 
job, you verify that the message has been signed using your boss' 
public key. What's the problem here?

--Paul Hoffman, Director
--Internet Mail Consortium


Re: PKIs and trust

2003-12-14 Thread Paul Hoffman / IMC
At 2:48 PM -0500 12/14/03, Keith Moore wrote:
All of those statements, assertions, and so on can be made in 
simple signed messages. When you get a message with statements 
about your job, you verify that the message has been signed using 
your boss' public key. What's the problem here?
Some of the problems occur when I start trusting software to tell me 
whether to believe in the identity, authority, or role claimed by 
someone I don't know personally.  It gets worse if I start trusting 
software to make decisions based on the things that people I don't 
know personally tell me.
You're talking about a problem with software, not with the standards.

You started this thread with:

At 12:12 PM -0500 12/14/03, Keith Moore wrote:
Until PKIs are able to represent the rich diversity of trust 
relationships that exist in the real world, they are mere 
curiosities with marginal practical value.
PKIs are able to represent the blah blah blah; your software isn't 
yet translating that into something that you want to use.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: PKIs and trust

2003-12-14 Thread Paul Hoffman / IMC
At 2:52 PM -0500 12/14/03, [EMAIL PROTECTED] wrote:
On Sun, 14 Dec 2003 11:33:23 PST, Paul Hoffman / IMC said:
 At 2:14 PM -0500 12/14/03, Keith Moore wrote:
I trust my boss to make statements about my job.
 All of those statements, assertions, and so on can be made in simple
 signed messages. When you get a message with statements about your
 job, you verify that the message has been signed using your boss'
 public key. What's the problem here?
Please explain how you enforce that the signed part of the message *only*
contains statements about his job, and does not make any claims that 
he doesn't
trust his boss to make, but does trust his landlord to make?
As the person trusting something, I don't have to enforce anything: 
I look at it and make a trust judgement.

If you are assuming that this trust has to be made automatic, then 
you first need to scope the kind of statements that can be made. You 
then describe that scope in the boss' certificate.

Note that this isn't a hypothetical.  This message is signed, and it 
quotes you
quoting Keith.  Or at least it claims to.  Now what does the 
signature tell you
about the words that Keith is attributed with?  Absolutely nothing - 
you get to
rely on your judgment of how careful I am with attributing quotes.
Exactly right. I don't trust you to quote Keith or me. So?

At our site, we have multiple people who are authorized to sign 
purchase orders.
Explain a simple signed message format that explains to the vendor that the
digitally signed PO from Mary Smith for desktop computers is OK, because Mary
is authorized to buy those for us, and the PO from Richard James for concrete
for construction project #11934 is OK - but Richard isn't allowed to 
buy desktop
computers or concrete for other projects.
All of that is describable, and many vendors have such products. 
There are no standards (or none that are significantly followed) for 
such assertions. So? Many different PKIs can handle such assertions, 
once you codify them.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: PKIs and trust

2003-12-14 Thread Paul Hoffman / IMC
At 4:29 PM -0500 12/14/03, [EMAIL PROTECTED] wrote:
On Sun, 14 Dec 2003 12:09:37 PST, Paul Hoffman / IMC said:

 All of that is describable, and many vendors have such products.
 There are no standards (or none that are significantly followed) for
 such assertions. So? Many different PKIs can handle such assertions,
 once you codify them.
I'm having a very hard time as reading this as anything except Sure, the
PKI's out there could do it, if we only understood it well enough to come
up with a consistent way that would work for everybody.  And since the PKI
could deal with it if we knew what we wanted it to deal with, it's not a
problem for actual production use of a PKI now.
Try harder then. Maybe try The PKI works fine for this, as does the 
signed messages, and we understand what we want, but we can't figure 
out how to trust the other humans in the process. You can't find a 
consistent way that would would for everybody if they can't define 
why and how they trust each other.

There are literally billions of dollars that can be saved if someone 
can figure out how to get the human trust part to work. Given that 
the technical end of the PKI world has not changed much in the past 
five years, it's pretty clear that if someone is leaving billions of 
dollars on the table, the problem is pretty difficult and not prone 
to a technical fix.

This has nearly nothing to do with the technical part of the PKI, and 
everything to do with the humans.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: ITU takes over?

2003-12-12 Thread Paul Hoffman / IMC
At 8:39 AM -0800 12/12/03, Tony Hain wrote:
vinton g. cerf wrote:
 ...
 Unfortunately, the discussion has tended to center on ICANN as the only
 really visible example of an organization attempting to develop policy
 (which is being treated as synonymous with governance
To further your point, an area completely outside of ICANN's purview, yet an
area requiring governance is PKI. We are at the point where deployment of a
PKI has moved beyond technical issues, becoming almost completely the policy
 politics of trust. Until the politicians broker the trust relationships,
there is nothing technology can do.
s/politicians/politicians and business community/

Absolutely agree with this sentiment. Anyone who starts an anti-spam 
proposal with All we need to do is digitally sign the {messages|SMTP 
transmissions}... is completely unclear on how little governance 
there is in this area.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: just a brief note about anycast

2003-12-08 Thread Paul Hoffman / IMC
At 3:30 PM +1200 12/9/03, Franck Martin wrote:
And one important fact, is that IETF issues standards which do not 
contain patents... but ITU does!
It depends on what you mean by do not contain patents. If you mean 
that are not covered by any patents, then tropical living has 
really affected your view of IETF reality. Reading 
http://www.ietf.org/ipr.html will possibly drag you back to where 
the rest of the folks on this mailing list reside.

--Paul Hoffman, Director
--Internet Mail Consortium



Re: How to submit a draft

2003-11-24 Thread Paul Hoffman / IMC
At 4:21 AM -0800 11/21/03, Dinesh Kumar wrote:
  Could someone tell the procedure for submitting a
draft to IETF.
See The Tao of the IETF at http://www.ietf.org/tao.html.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: i18n name badges

2003-11-20 Thread Paul Hoffman / IMC
There are going to be *at least* three desirable encodings of a person's
identity -- the 'natural' encoding in the preferred/native charset of the
person's name, some kind of phonetic-ASCII encoding that tells non-natives
how to pronounce the name, and the email/idna encoding[s] that folks would
use to exchange mail.
Folks: it has *not* been decided that there will be a different 
encoding for email. One such encoding has been proposed; other 
proposals have been made. This is being actively discussed, and there 
should be no assumption that the discussion will end with a new 
encoding.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: Plans for IETF - 60

2003-11-19 Thread Paul Hoffman / IMC
At 10:41 AM -0500 11/19/03, Brett Thorson wrote:
I am hoping to get this done in time for IETF 59, but with current workload
here at the IETF, I am going to aim for 60.
Something else to add to the list: make software available for 
popular OS's that help the NOC team document the problems. For 
example, it would be grand if I could tell you which MAC just 
hijacked my network connection and turned it into a peer-to-peer 
connection. The software should be available for Win2K and later, as 
well as OS X. I suspect that the software is already available for 
Linux and BSD; all you need is instructions on which commands to use 
to get the data that is valuable to the NOC.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: IETF58 - Network Status

2003-11-13 Thread Paul Hoffman / IMC
Sitting in the Thursday plenary, I note none of the network-to-ad-hoc 
flappage that have been plaguing us the past few days.

Did the attackers get bored and go home?

Did the accidental ad-hocers finally get their settings right?

Did someone deploy a good blocking mechanism?

--Paul Hoffman, Director
--Internet Mail Consortium


Location of the IMAA list (was: RE: FYI: BOF on Internationalized Email Addresses (IEA))

2003-10-28 Thread Paul Hoffman / IMC
At 11:54 AM -0500 10/28/03, [EMAIL PROTECTED] wrote:
The BOF description lists [EMAIL PROTECTED] as the
discussion list, but this discussion is being
cc:ed to [EMAIL PROTECTED]  I'd suggest that you
move this discussion to whichever of those lists
is actually correct.
It is [EMAIL PROTECTED], although because Patrik sent out the wrong 
address, I have made sure that both addresses work. An archive of the 
list, and links to the current versions of the drafts, can be found 
at http://www.imc.org/ietf-imaa/.

No more messages to all lists: that's what the IMAA list is for.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: How to bulid a new group?

2003-10-02 Thread Paul Hoffman / IMC
At 11:07 AM +0800 10/3/03, wang liang wrote:
 If I find there is no a group for some important issues about Internet, and
It may be  necessary  to build a new one,what should I do?Who will deal with
this kind of suggestion?Where can I find the detailed  process of  asking
for a new work group?thanks.
See http://www.ietf.org/tao.html for probably everything you need 
to get started.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-18 Thread Paul Hoffman / IMC
At 2:14 PM +0200 9/18/03, Francis Dupont wrote:
= IMHO it should reject SMTP connection from the beginning with
the 521 greeting described in RFC 1846...
People are unhappy about VeriSign breaking the rules. But here you 
are proposing that they follow an *experimental* RFC whose rules were 
not accepted into the later revision of SMTP in RFC 2821. How will 
them breaking the rules twice make it better?

--Paul Hoffman, Director
--Internet Mail Consortium


Re: A modest proposal - allow the ID repository to hold xml

2003-09-02 Thread Paul Hoffman / IMC
At 10:47 AM -0700 9/2/03, Eliot Lear wrote:
I don't know about about you, Paul, but I'm writing my drafts using 
EMACS and Marshall's tool.  That allows for generation of HTML, 
NROFF, and text.  The HTML allows for hyperlinks, which is REALLY 
nice.
Great! Why does that mean that the XML input should be published in 
the Internet Drafts directory along with the text output?

--Paul Hoffman, Director
--Internet Mail Consortium


Re: WG review: Layer 2 Virtual Private Networks (l2vpn)

2003-06-23 Thread Paul Hoffman / IMC
At 10:26 PM -0700 6/21/03, Alex Zinin wrote:
Folks-

 Having watched this discussion, it seems a couple of data points
 might be helpful:
 1. L2VPN and L3VPN proposed WGs are part of PPVPN WG split

Creation of L2VPN and L3VPN WG does not represent addition of new
work to the IETF. They are created as part of the process of
splitting the PPVPN WG to improve progress and focus it by setting
clear directions in the charters.
 2. L2VPN work is already chartered within the IETF

The discussion about whether this work should be chartered or not
happened when the PPVPN WG was being created. Please see minutes
and slides from the PPVPN BOF at IETF 49. L2VPN solutions are
within the PPVPN charter and milestones.
 Hope this helps.
My comments about possibly moving this work to a different standards 
body is based on our track record with this work so far in the IETF, 
not a worry about new work.

Just because we chartered some work doesn't mean we shouldn't revisit 
the question of whether or not doing so was a good idea, particularly 
after we see the kind of progress that has been made and the problems 
that have come up under those charters.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: WG review: Layer 2 Virtual Private Networks (l2vpn)

2003-06-18 Thread Paul Hoffman / IMC
At 1:31 PM -0700 6/18/03, Vach Kompella wrote:
  - the IETF's track record for this work so far is quite poor

That's not a problem of the ppvpn group only.  It is a problem of the IETF.
Generally agree.

I don't need to refresh your memory about IPSec, do I?  SKIP, Skeme, Oakley,
IKE.  AH or ESP with auth?  5 years of bloody fighting.
I'm not sure how to argue with the statement the IETF has done a 
horrible job with a similar working group, so we want our working 
group in the IETF.

First off, I agree with you about the IPsec WG, and think it is a 
very good indicator of what the IETF does poorly, particularly in the 
area of focus. (Hint: look at the number of WG Internet Drafts there 
are right now in IPsec that no one is working on.) The problems in 
the IPsec WG and others are typical of the problems of the WGs that 
are working on trusted VPN technologies.

It's wherever the action is that the political jostling for position 
is the most
prominent.  That's also where the leadership needs to be strong and 
participants
need to have a nose to the grindstone attitude.  That's hardly an indication
that the work should not be chartered or worked upon.
Er, yes it is. There is no indication that we will do a better job 
than the terrible job we are doing now. What you propose sounds like 
we're terrible parents for our six children and barely have enough 
time to pay attention to them, but maybe we'll be better with the 
seventh.

  We have not shown any ability to create standards in this area with
 due speed or predictability. We have not shown the good judgement
 needed to limit the scope of the work we do. (Look at the number of
 L2VPN-based Working Group drafts in PWE3 and PPVPN, much less the
 large number of non-WG documents being actively discussed.
Do you think the new L2VPN charter addresses these concerns of scoping?  How
about the timelines?  Basically, it's going to be a WG issue, chairs and
participants, to finish the WG charter items first.
Why do you think that the re-chartered WG will have any more luck 
with these than the current one? There are a zillion hardware vendors 
and service providers who have reasons to want the dozens of 
documents that are in the current WGs, and it takes very little 
effort on their part to promote their views. The IETF structure does 
poorly in such an environment; maybe a different standards body would 
do better.

  The IETF understands the need for layer 2 technologies for OAM much
 better than we understand the Internet customer's need (or even
 concern) for layer 2 transport of their IP packets. This is because
 we have a tighter relationship with operators than we do with
 Internet users, and because Internet users generally could care less
 about how their ISPs move their traffic as long as they meet the
 service level agreements. The ISPs would love to have better
 cross-vendor interop for the L2VPN technologies, but so far the
 vendors haven't had time to think about that because they have been
 overloaded with the literally dozens of flavors that are being
 discussed in the IETF.
Are you talking PWE3 or L2VPN?
Yes. There is a significant amount of spillage between the two.

The gazillion drafts is in PWE3.  The interop issues are localized 
to the drafts
with contention, silly issues of where bits should go.

There are 16 pseudowire types:
   0x0001   Frame Relay DLCI
   0x0002   ATM AAL5 SDU VCC transport
   0x0003   ATM transparent cell transport
   0x0004   Ethernet Tagged Mode
   0x0005   Ethernet
   0x0006   HDLC
   0x0007   PPP
   0x0008   SONET/SDH Circuit Emulation Service Over MPLS (CEM) [8]
   0x0009   ATM n-to-one VCC cell transport
   0x000A   ATM n-to-one VPC cell transport
   0x000B   IP Layer2 Transport
   0x000C   ATM one-to-one VCC Cell Mode
   0x000D   ATM one-to-one VPC Cell Mode
   0x000E   ATM AAL5 PDU VCC transport
   0x000F   Frame-Relay Port mode
   0x0010   SONET/SDH Circuit Emulation over Packet (CEP)
At least half of these are and have been interoperable.  It is the harder (and
more arcane, IMHO) PW types that people are having a hard time coming to some
sort of compromise.
And why should the IETF care at all about these? There are other fora 
for layer-2 interworking.

BTW, I'm glad to see you have a healthier respect for providers than 
Kurtis who
claims that most of these providers have bought what their vendor 
told them to
buy.
He and I might both be right. In my talks with service providers, I 
find that many of them who want to expand their presence in, or just 
get into, the IP VPN market look at what hardware they have on hand 
in their core (they certainly can't buy any significant new hardware 
these days) and base their decision on the layer-2 technologies on 
that. Usually, the customers don't know or care. If the customers 
care, they only care enough to ask are you using MPLS 

RE: WG review: Layer 2 Virtual Private Networks (l2vpn)

2003-06-18 Thread Paul Hoffman / IMC
At 6:43 PM -0700 6/18/03, Vach Kompella wrote:
  I'm not sure how to argue with the statement the IETF has done a
 horrible job with a similar working group, so we want our working
 group in the IETF.
Well, how about, we can't agree on IPv6 numbering schemes, so let's 
find another
standards org to fix that problem. We can't decide whether site-local is good
for IPv6 or not, so let's find another standards org.
IPv6 is an IP technology. We are supposed to know how to make it 
work. L2VPNs (and half of the interesting parts of 2547bis L2VPNs) 
are outside the scope of our expertise.

 ...  What kind of
unmitigated disaster would IKE have been if we had just punted it 
over to, say,
the ITU?
Worse, no doubt. But I'm not proposing to send the L2VPN work to an 
organization with no expertise or credibility in the L2 area.

Alternatively, we can own up that it is OUR problem, i.e., the IETF, and if we
want a solution, we will create one here.
If we decide that the problem is one in our realm, I fully agree. 
But transporting layer 2 stuff over IP is not a problem that affects 
the Internet. It is a problem for the service providers marketing 
departments. The past three yeas have proven that service providers 
can satisfy their customers needs with L3VPNs, with 
somewhat-interoperable L2VPNs, with non-interoperable L2VPNs, and 
with just plain layer 2 circuits. What is the problem that the IETF 
needs to standardize?

  E.g., I'm happier having IPSec than
no security.
Of course. But we'd both be happier if IPsec worked better as a VPN 
technology, and applications folks would be happier if it worked 
better as an application security technology.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: CLOSE ASRG NOW IT HAS FAILED

2003-06-16 Thread Paul Hoffman / IMC
At 11:27 AM -0600 6/16/03, Vernon Schryver wrote:
All contributions that are rejected
by any moderators (including spam filters) of any IRTF or IETF mailing
lists must be archived and should be published on web pages somewhere.
FWIW, some of the IETF WG mailing lists that IMC runs get 10 spams a 
day, and often get the virus/trojans that are 120K each. This is not 
an insignificant amount of junk to wade through when looking for 
proof of moderator badness/goodness.

And there's also the problem of robots that harvest everything, 
regardless of your robots.txt file. If we had a system like you 
describe, it would be believable that the archives would get a fair 
number of hits from people searching for pr0n but finding our archive 
of spam instead.

I think that having all bounces (for whatever reason) archived is 
fine; I think having it as web pages somewhere is overkill. Access 
to one of the big text archives can be a trivial password given to 
anyone who wants it for research purposes.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: The utilitiy of IP is at stake here

2003-06-01 Thread Paul Hoffman / IMC
At 4:12 PM -0700 5/30/03, Dave Crocker wrote:
Perhaps you could synthesize the numbers in a way that the carriers will
agree to?   That it, sanitize out the competitive information, to
produce something relevant only to spam control in the aggregate.
The numbers are a few years old, anecdotal (although at least they 
came from people inside the companies!), and not computed in the saw 
way. For instance, BigISP1 counted the time spent on customer service 
on spam-related topics plus sysop time plus connectivity costs, while 
BigISP2 only counted the latter two.

But, to be more relevant, let me say that all of the numbers were in 
millions of dollars.

To bludgeon the point a bit:

- Big ISPs and other mail service providers know how much spam is costing them.

- For some ISPs, the amount is in the millions of dollars.

- Even an expensive team of consultants could devise a trust-based or 
work-based protocol and shepherd it through the IETF for less than 
one tenth the annual cost for a single ISP.

Given the above, the reason that the people who are most financially 
hurt by the spam problem have not done anything about it from a 
protocol level is either that they are financially stupid or that 
their research into the solutions didn't result in a solution that 
would cost them more. I believe it is the latter. People outside 
those companies might have different opinions, but to say if we 
invent a protocol that we think will work, they will use it is 
nonsense.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: The utilitiy of IP is at stake here

2003-05-31 Thread Paul Hoffman / IMC
At 11:36 PM -0700 5/29/03, Dave Crocker wrote:
The POP-IMAP example is excellent, since it really demonstrates my
point. IMAP is rather popular in some local area network environments.
However it's long history has failed utterly to seriously displace POP
on a global scale.
Exactly right. The benefits of IMAP are obvious to everyone who has 
looked at it in any depth, and yet it is very thinly deployed. The 
main reason: the perceived additional administrative overhead.

EAH Large-scale mail carriers would probably switch quickly if
EAH the accountability feature proved useful,
and now we are back to hypothesizing about the behaviors of
mega-corporations with massive installed bases and a rather poor history
of adopting changes from the IETF community.
So far on this thread, we have heard from none of the large-scale 
mail carriers, although we have heard that the spam problem is 
costing them millions of dollars a year. That should be a clue to the 
IETF list. If there is a problem that is affecting a company to the 
tune of millions of dollars a year, and that company thinks that the 
problem could be solved, they would spend that much money to solve 
it. Please note that they aren't.

I have spoken to some of these heavily-affected companies (instead of 
just hypothesizing about them). Their answers were all the same: they 
don't believe the problem is solvable for the amount of money that 
they are losing. They would love to solve the spam problem: not only 
would doing so save them money, it would get them new income. Some 
estimate this potential income to be hundreds of millions of dollars 
a year, much more than they are losing on spam. But they believe that 
the overhead of the needed trust system, and the cost of losing mail 
that didn't go through the trust system, is simply too high.

You might disagree with them, and based on that disagreement you 
might write a protocol. But don't do so saying the big carriers will 
want this without much more concrete evidence as to their desires.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: The utilitiy of IP is at stake here

2003-05-31 Thread Paul Hoffman / IMC
At 10:40 AM -0700 5/30/03, Peter Deutsch wrote:
Paul Hoffman / IMC wrote:
...
 So far on this thread, we have heard from none of the large-scale
 mail carriers, although we have heard that the spam problem is
 costing them millions of dollars a year. That should be a clue to the
 IETF list. If there is a problem that is affecting a company to the
 tune of millions of dollars a year, and that company thinks that the
 problem could be solved, they would spend that much money to solve
 it. Please note that they aren't.
Well, perhaps it's more accurate to say if they thought it could be
solved by working with all those nice and entusiastic folks on the IETF
general discussion list... ;-)
We disagree here. For the millions of dollars that they are losing, 
they would come up with the solution with the IETF or not. They 
haven't.

  I have spoken to some of these heavily-affected companies (instead of
 just hypothesizing about them). Their answers were all the same: they
 don't believe the problem is solvable for the amount of money that
 they are losing. They would love to solve the spam problem: not only
 would doing so save them money, it would get them new income. Some
 estimate this potential income to be hundreds of millions of dollars
 a year, much more than they are losing on spam. But they believe that
 the overhead of the needed trust system, and the cost of losing mail
 that didn't go through the trust system, is simply too high.
 You might disagree with them, and based on that disagreement you
 might write a protocol. But don't do so saying the big carriers will
 want this without much more concrete evidence as to their desires.
Paul, are you aware of any concrete numbers here?
Yes.

 I've looked through
the IMC site, but the only references to cost seem to be in a report
from the late 90's, with no hard data. If not, this might be something
the IMC could consider pulling together? I'd agree that there's way too
much hand-waving going on here on this point...
All my discussions were not for attribution. Large mail carriers 
don't want their competitors to know how many users they actually 
have (as compared to the highly inflated numbers that various 
analysts say they have), and they certainly don't want their 
competitors knowing how much they are spending on dealing with spam. 
Our company spends more per user on fighting spam than 
OtherBigCarrier!

In aggregate, then numbers were in the tens of millions of dollars 
US, and that was more than two years ago. I would be shocked if the 
numbers were much lower now, given the greatly increasing amount of 
spam and the level-or-increasing number of customers.

Again, the summary is that these folks are hurting badly enough to 
throw highly-qualified full-time staff on the problem, and they don't 
believe any of the solutions that have been presented so far will 
save them enough money. If they thought differently, they would have 
deployed them by now so that they could save those millions of 
dollars.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: The utilitiy of IP is at stake here

2003-05-31 Thread Paul Hoffman / IMC
At 11:09 AM -0700 5/30/03, Tony Hain wrote:
Paul Hoffman wrote:
 So far on this thread, we have heard from none of the large-scale
 mail carriers, although we have heard that the spam problem is
 costing them millions of dollars a year. That should be a clue to the
 IETF list. If there is a problem that is affecting a company to the
 tune of millions of dollars a year, and that company thinks that the
 problem could be solved, they would spend that much money to solve
 it. Please note that they aren't.
And that would be because they can't do it in isolation. They need a
system wide standard everyone is building to, to make your argument
below about cost of untrusted mail moot.
And you believe that these companies are so stupid that when they 
have a problem that is costing them tens of millions of dollars a 
year, they wouldn't think of coming together for a solution? Maybe I 
have a higher opinion of them than you do because they were members 
of my consortium.

All of these companies have people following (and often 
participating) in the IETF. To assume otherwise without first asking 
them is pretty silly.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: The utilitiy of IP is at stake here

2003-05-30 Thread Paul Hoffman / IMC
At 2:22 PM -0700 5/29/03, Eliot Lear wrote:
Please indicate some historical basis for moving an installed base of
users on this kind of scale and for this kind of reason.
History is replete with examples.  From the Internet Worm to Code 
Red, consumers do install software when they perceive either a 
threat or a benefit.
Tony's proposal is not for new software: it is for software that 
*replaces* what they have now. Further, it is not a one-to-one 
replacement. It requires new administrative actions by the sysadmin 
and by the user to validate who they want to get mail from.

  Getting rid of spam is a HUGE benefit.
And all the proposals so far have some amount of cost. The trick is 
to come up with a solution whose benefit to at least half of the 100 
million mail users overwhelms the cost. That is, the bother of using 
the new system has to be less than the bother of getting spam.

  Heck.  What I've found so amusing is that people seem to upgrade 
their Microsoft systems just 'cause, with no perceived benefit, but 
merely protecting from Bit Rot.
This is because (despite history) people believe that the replacement 
will be no harder to user than the previous version.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: The utilitiy of IP is at stake here

2003-05-30 Thread Paul Hoffman / IMC
At 4:58 PM -0700 5/29/03, Tony Hain wrote:
The sysadmin effort would be setting up an automated way to hand out
keys, and the user would have a one-time (or very infrequently) effort
to establish a key pair.
And you are saying that is trivial? How would a typical user know 
which third parties to trust? How would the typical user know what to 
do when they started getting spam through this filter? How would the 
typical user know what to do when someone wants to send him/her mail 
but can't because the sender isn't in the right trust group?

If you have already worked this out and I missed it, my apologies. A 
pointer to that document would be very helpful.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: spam

2003-05-29 Thread Paul Hoffman / IMC
At 11:36 AM -0700 5/28/03, Tony Hain wrote:
The external mechanisms already exist to deal with the
social engineering once the originator can be pinned down.
This is good to hear. I thought that the international trusted 
micropayments that would be needed for such a sender-pays system was 
a problem that was yet to be solved.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: [Sip] Eating our own Dog Food...could the IAB and IESG useSIP for conference calls

2003-03-25 Thread Paul Hoffman / IMC
A modest request: could all the people who think that this is a good 
place to advertise their company's products and services please 
reconsider? If you really want to offer your services, send a message 
to the original proposer, not the whole mailing list. Advertising 
here is really, really tacky.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: Barrel-bottom scraping

2003-03-23 Thread Paul Hoffman / IMC
At 12:05 AM +0200 3/24/03, Pekka Savola wrote:
I fail to see what added value they might bring
They could be very useful to explaining to our management and 
marketing departments and so on the value of standards, particularly 
IETF standards. Further, because most companies focus on a small part 
of the Internet, they could show why the whole picture is important.

And I agree that they should not be held next to IETF meetings. Maybe 
once a year between meetings, or in conjunction with other 
networking events that these people might go to, such as N+I or 
Comnet.

--Paul Hoffman, Director
--Internet Mail Consortium


Can we move this discussion to a more appropriate place? (was:Re: IAB policy on anti-spam mechanisms?)

2003-03-12 Thread Paul Hoffman / IMC
This thread is trying to redefine or redesign SMTP's use of TLS. It 
should probably be happening on the [EMAIL PROTECTED] list 
instead of the main IETF mailing list. That's where the implementers 
are, and that's where the implementers of most of the foo-over-TLS 
protocols are. They too should be hearing this discussion, since much 
of it applies to many protocols, not just SMTP.

--Paul Hoffman, Director
--Internet Mail Consortium


Re: IAB policy on anti-spam mechanisms?

2003-02-28 Thread Paul Hoffman / IMC
At 5:34 PM -0800 2/27/03, [EMAIL PROTECTED] wrote:
Your question assumes that the DUL is actually a meaningful anti-spam
mechanism. It is not.
Could you elaborate a bit on what you mean by meaningful? As 
someone who uses the DUL list as an anti-spam mechanism and who 
experiments with turning it off and on, I can definitely say that 
turning it on reduces the amount of spam I receive (on the order of 
about 100 messages a day).

I recognize that it also harms folks like you for many of the reasons 
you give. But I don't understand why you say it is not a meaningful 
anti-spam mechanism.

--Paul Hoffman, Director
--Internet Mail Consortium


RE: a personal opinion on what to do about the sub-ip area

2002-12-09 Thread Paul Hoffman / IMC
At 4:50 PM -0800 12/9/02, Tony Hain wrote:

If there were are real need for cross group
coordination within the sub-IP area, that would be a little clearer.


A presentation at the SubIP Area meeting in Atlanta drove home the 
point that the amount of coordination in the area was not as high as 
expected when the area started. The originally-envisioned hourglass 
(with CCAMP in the middle) turned into spaghetti. This is not to say 
that the spaghetti is bad, just that the proposed coordination didn't 
help keep them on track and therefore might be less needed than some 
are saying.

--Paul Hoffman, Director
--Internet Mail Consortium



Re: mail headers for announce

2002-10-30 Thread Paul Hoffman / IMC
ahem Or the IETF could simply start using its own Proposed Standard 
mechanism described in RFC 2919.

--Paul Hoffman, Director
--Internet Mail Consortium



[idn] Re: CDNC Final Comments on Last call of IDN drafts

2002-06-06 Thread Paul Hoffman / IMC

At 12:52 PM +0200 6/6/02, Simon Josefsson wrote:
This means IDN is not guaranteed to be secure on non-Unicode systems.
There are alot of non-Unicode systems out there today...

Nothing is ever guaranteed to be secure. Even if we supplied mapping 
tables, there is no guarantee that the mapping tables we supplied 
would match those already in use in those systems, so there will be 
the same security issues. In fact, we can be sure that some 
standardized mapping tables would disagree with those already 
implemented.

   When standards bodies for character sets define such equivalences, and
  when those equivalences gain popularity, it might be appropriate for
  the IDN effort to consider incorporating these new standards.

This isn't an adequate solution IMHO, when the consequences of errors
made by such standard bodies, or conflicts between different standard
bodies, or different interpretations of said standards, or changes
between different versions of those standards, or simply a complete
lack of standardisation in the area (which is the situation today),
may be exploitable for attacking systems on the Internet.

And your proposal for an adequate solution is? Short of forcing 
every current system to use a single set of standardized mapping 
table (which is patently unrealistic), how could you ever avoid such 
an exploit?

Further, the exploit you descirbe is identical in every application 
that allows an encoding of the Unicode character set (such as UTF-8). 
Are you saying that we shouldn't allow any input in UTF-8 in any 
application until there is both a standard set of mapping tables and 
absolute conformance to them?

--Paul Hoffman, Director
--Internet Mail Consortium




Re: [idn] WG last call summary

2002-03-12 Thread Paul Hoffman / IMC

At 3:58 AM + 3/11/02, D. J. Bernstein wrote:
You say that you are obliged to ignore all these objections because the
IDN WG has to _do something_.

You are lying again, Dan. Marc never said that, and you know it.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: RFC2119 Keywords

2002-02-15 Thread Paul Hoffman / IMC

At 8:15 AM -0500 2/15/02, Scott Brim wrote:
In normative text, I don't see how must could occur anywhere except
where it was supposed to mean MUST.

It occurs when describing how something happened, not what needs to 
happen. Example from a current Internet Draft that is having the 
capitalization fixed:

...not less than 3, but 4 is less than 5, so 4 must be the last digit.
-
...not less than 3, but 4 is less than 5, so 4 has to be the last digit.

There were a few places where the must turned into a MUST as a 
way of specifying how an implementation of the protocol had to work.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: REMINDER: revision to RFC2727 - NOMCOM

2002-01-25 Thread Paul Hoffman / IMC

At 8:50 AM -0800 1/25/02, Dave Crocker wrote:
At 10:34 AM 1/25/2002 -0500, James M Galvin wrote:
I just wanted to call your attention to the recently announced proposed
revision:

Perhaps the best time for pursuing revisions to this document is 
immediately after the nomcom has done it job.  That way you will 
have a pool of very fresh suggestions to work from.

(and this suggestion is coming from someone on the current nomcom 
who is explicitly offering to participate on that basis, but also 
feels that it would not be appropriate to participate in the middle 
of the major nomcom deliberations.)

As someone who was on a previous nomcom, I fully agree with Dave. It 
would have been silly to think about this while in the midst of 
deliberations that could affect what I said.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: one copy sent to list but THREE returned

2002-01-06 Thread Paul Hoffman / IMC

At 5:11 PM -0500 1/6/02, Gordon Cook wrote:
I sent but a single copy of 'empowering' to the list.  It returned 
THREE to me.  If everyone else got 3, my apologies.  If anyone can 
inform me as to what happened i'd appreciate it.

Er, a better question is why you spammed the IETF list at all.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Splitting the IETF-Announce list?

2001-11-13 Thread Paul Hoffman / IMC

At 4:02 PM -0600 11/13/01, Pete Resnick wrote:
I am interested in getting all of the posts to the IETF-Announce 
list *except* for the greatest bulk of those posts: Internet Draft 
announcements. I find it hard to believe that I am the only one who 
would prefer if the I-D announcements were on a separate mailing 
list. Would it be possible to implement this? If I am correct and 
there are an awful lot of people who are uninterested in I-D 
announcements,

Pete, you really should get a mail client that has an easy-to-use 
filtering interface. :-)

  it would cut down on outgoing mail of the secretariat substantially.

Ah, that might be a consideration. Unless it turns out that the 
secretariat's Internet connection bills are high, it seems worthwhile 
to keep the lists merged. To many of us, seeing the names and titles 
of new -00 drafts is as interesting as seeing RFC announcements. 
Further, waiting until a draft is in IETF Last Call before people 
notice it is not a good way to create protocols.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: participation in IETF meetings

2001-10-23 Thread Paul Hoffman / IMC

Going back to the original question about more multicast sessions:

The advantage of multicast vs. tape-and-archive is the real-time 
aspect for the viewer. However, this is rarely, rarely used. If it 
turns out that switching from multicast to tape-and-archive can get 
more camera operators in more rooms, that would be a win for more WGs.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Last Call: PIC, A Pre-IKE Credential Provisioning Protocol toProposed Standard

2001-10-11 Thread Paul Hoffman / IMC

At 3:56 PM -0400 10/11/01, Darren Dukes wrote:
This may be  nit-picking but I have seen no mention on IPSRA, or any other
list, or during any meetings that there are two interoperating independent
implementations of this draft.  Is anyone able to confirm that
implementations exist and interoperate?

Yes, it is nitpicking. This call is for PIC to go to *Proposed* 
Standard. The requirement for two interoperable implementations is 
for going to *Draft* Standard, which is the step after Proposed 
Standard. See RFC 2026 for the not-so-gory details.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: why cant this list clean up the spam!!??

2001-07-24 Thread Paul Hoffman / IMC

If this list cleaned up the spam, how would we receive all your 
unsolicited advertisements for your newsletter? I wouldn't want to 
prevent IETF list subscribers from having the chance of getting 
important Internet insight from someone who can't tell the difference 
between a virus/worm and spam.

it is enough to make me consider subscribing to the censored list...

I don't subscribe to that list: do they pass along your ads? If so, 
it won't fix your spam problem.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: OPES charter proposal again.

2001-07-02 Thread Paul Hoffman / IMC

At 2:45 AM +0100 7/3/01, Lloyd Wood wrote:
I do like the 'extend [..] the iCAP protocol without being obliged to
retain any level of compatibility with the current iCAP proposal.'
Fine, since iCAP's just an individual draft -- but isn't extending
without being compatible something only Microsoft is generally
regarded as being capable of doing?

No, we have done it with SSL-TLS, S/MIMEv2-S/MIMEv3, 
PGPorig-OpenPGP, vCalendar-iCalendar, and so on.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: too many Out of Office AutoReply

2001-06-29 Thread Paul Hoffman / IMC

At 9:30 AM -0400 6/29/01, Steven M. Bellovin wrote:
But I'm disturbed that Exchange is using the Precedence: line as its
selector mechanism.  I'm hardly an email expert, but a quick grep
through the RFCs turned up exactly one mention of the Precedence:
header line.  That reference is in 2076, which describes it as
Non-standard, controversial, discouraged.  No RFC definition is cited.
It would be nice if such an important feature relied only on
standardized headers.

Steve, we'll forgive you for not being an email expert. If you were 
one, you would know that this topic, and half a dozen of related 
meta-topics, have been beaten to death in the (finally dead!) DRUMS 
WG, and on the ietf-822 mailing list in the past six or seven years. 
A summary is that some implementations prefer to be strictly 
standards-compliant but piss off their users by not doing enough, 
while others choose to do things the users want even though it 
doesn't go strictly by the standards. In this case, there are 
non-standard headers in common use that give valuable heuristics to 
programs, and no standard ones that give the same information. Many 
companies, apparently including Microsoft, use that non-standard 
information.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: since drums is closed...

2001-05-22 Thread Paul Hoffman / IMC

At 12:00 PM -0500 5/22/01, Chip Rosenthal wrote:
On Tue, May 22, 2001 at 05:00:49PM +0200, Maurizio Codogno wrote:
   I hope someone may give me an answer here, even if the topic is
   not quite in topic for the list.

Don't have an answer to your question, but thought I'd point out
that most of the DRUMS participants have moved over to the ietf-822
mailing list hosted at imc.org.

The folks who want to talk about message formats have moved there. 
The folks who want to talk about message transport have moved to 
ietf-smtp. DRUMS was covering two different topics.

IIRC [EMAIL PROTECTED] should work.

Yup, and [EMAIL PROTECTED] will get you the companion list.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Mailing list policy

2001-05-21 Thread Paul Hoffman / IMC

At 4:54 PM -0400 5/20/01, Perry E. Metzger wrote:
When you are the maintainer of a list

That assumes that someone is the maintainer of the IETF mailing list. 
At this moment, that is not the case. You are asking that an 
additional  task be put on one of the IETF Secretariat folks. That's 
a reasonable request (and one that I would second), but it is not 
based in current reality.

   Quite a few IETFers have more than one email address.

Which is why Majordomo lets you have a seperate list of addresses that
can post but don't get the mail. Works beautifully.

No, it works clumsily. It requires that someone who wants to post 
from a different address than the one they are subscribed to must 
somehow register the alternate address with the list maintainer. Or 
that the list maintainer must write custom software that enhances the 
list of allowed-to-post addresses with guesses like if there is a 
subscription for [EMAIL PROTECTED], also allow [EMAIL PROTECTED]; if 
there is a subscription for [EMAIL PROTECTED], also allow 
[EMAIL PROTECTED]. But that will still miss people who are subscribed 
from [EMAIL PROTECTED] but posting from [EMAIL PROTECTED]

(And, yes, I've written such code for the lists IMC and VPNC runs; it 
is available on request.)

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Deja Vu

2001-03-22 Thread Paul Hoffman / IMC

At 12:52 PM -0500 3/22/01, William Allen Simpson wrote:
None of the Mac folks I've talked to have had any success with the
wireless DHCP.  We have to hand configure.

You must run in a different circle of IETF Mac users. None of the 
many that I know (including me) had any problem.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Blast from the past

2001-01-25 Thread Paul Hoffman / IMC

At 10:30 PM -0500 1/24/01, J. Noel Chiappa wrote:
PS: Those of you with sharp eyes will notice that everything has a class A
address!

...and that some of those addresses still work, and appear to be used 
by folks directly related to the original owners. If only URLs could 
be so persistent...

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Again: Number of Firewall/NAT Users

2001-01-23 Thread Paul Hoffman / IMC

At 12:10 PM -0500 1/23/01, Frank Solensky wrote:
One could ask a sample of administrators and extrapolate the results
but, again, the problem becomes how confident you could be of the
results if you don't get a very significant response rate

The problem is *much* worse than that. You have to be confident that 
your sampling method actually reflects enough of the Internet to be 
valid. Determining how you have reached a valid sample of 
administrators would be an interesting problem. Further, it is safe 
to assume that administrators for the largest networks are the least 
likely to reply, or to reply accurately.

And then there is the problem of assuming that they understand your 
question, and can even count the systems on their networks well 
enough to answer accurately...

--Paul Hoffman, Director
--Internet Mail Consortium




Re: internet voting -- ICANN, SmartInitiatives, etc.

2001-01-13 Thread Paul Hoffman / IMC

Ed, why do you insist on advertising your patent-pending voting 
solution on the IETF mailing list? It does not involve any IETF 
protocol work, does it?

--Paul Hoffman, Director
--Internet Mail Consortium




RE: IETF logistics

2000-12-20 Thread Paul Hoffman / IMC

At 9:44 AM -0800 12/20/00, Christian Huitema wrote:
I have a simpler point about logistics. What we are doing in the IETF
nowadays is downright dangerous. Prevalence of the laptops means that
the room is criss-crossed with power cables. Lack of room means that the
alleys are packed with standing or sitting listeners. If anything goes
wrong and we have to evacuate a room, we are in for the headlines. In
fact, if we continue breaking the fire code in every room of every
meeting, this outcome is almost guaranteed.

"Every room"? "Every meeting"? This hyperbole is not justified. It 
happened in some of the meetings, but not others. And, in some of 
those overcrowded meetings, Steve Coya came in and made some of us 
leave so that the aisle was clear.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Bottom feeders

2000-12-20 Thread Paul Hoffman / IMC

At 1:54 PM -0600 12/20/00, Brian E Carpenter wrote:
Hard  to say, but the newcomer's briefing and the Tao of the IETF are
both on the web site.

It is important to note that the Tao is being substantially upgraded 
and has lots of new material specifically aimed at dealing with some 
of the problems discussed on this thread. Look for a revised version 
of the draft in the near future.

--Paul Hoffman, Director
--Internet Mail Consortium




RE: IETF logistics

2000-12-19 Thread Paul Hoffman / IMC

Just to be clear, Pete's idea does not preclude giving newcomers to 
the meeting context. Instead of the 5 minutes for agenda bashing and 
then straight into presentations, the WG chair can spend 15 minutes 
saying what the group is doing, where the WG is and is not meeting 
its charter, and the status of the drafts in front of the group. At 
that point, viewers (as compared to participants) will know better 
whether or not they want to stay and will also have some idea of why 
the agenda looks like it does.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Congestion control

2000-12-17 Thread Paul Hoffman / IMC

WG chair says "OK, the room is now over-full. Who are there people in 
the doorway or outside who intend to work actively on drafts or 
forming the charter for this group? I see seven hands up. Could 
fourteen people who are currently sitting or jammed up against a wall 
who do *not* already plan to work actively on drafts or forming the 
charter for this group please be polite and leave? I will announce 
the mailing list address for this BOF on [EMAIL PROTECTED] if we get 
anywhere during this hour. Also, look for an announcement of a Bar 
BOF on the messages board later today. OK, about ten people have 
left. Thanks!"

This, of course, relies on the early sitters being polite and 
patient, but that has been known to happen at various times in IETF 
history.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Postel's razor applied to ACE

2000-12-08 Thread Paul Hoffman / IMC

One more time with feeling: please take this discussion to the IDN 
WG's mailing list. It has no place on the main IETF mailing list, and 
it needs to be discussed where the people working on the protocol are 
working.

Of course, one might want to read the WG's archive before posting to 
the list, given that many of the topics that have appeared here this 
week have already been discussed.

IDN WG info: http://www.i-d-n.net/

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Diacritical application in the DNS

2000-12-05 Thread Paul Hoffman / IMC

At 7:06 PM -0500 12/5/00, Dan Kolis wrote:
Now we are getting down to the nuts and bolts

No, we're not. This is a long re-hash of unfinished discussions 
happening in the IDN Working Group. As was requested earlier in this 
thread, please go read the archives of the IDN WG, and if you have 
something to say, say it there. The archives and all the drafts are 
at http://www.i-d-n.net/.

--Paul Hoffman, Director
--Internet Mail Consortium




Re: Bake-off as trademark

2000-11-07 Thread Paul Hoffman / IMC

OK, we have now reached 20 messages from armchair lawyers on 
trademark law. Given the earlier threads this year from armchair 
lawyers on patents, that leaves us just two months for us to have a 
ponderous thread on trade secrets, and we will have covered the main 
parts of intellectual property law.

For 2001, I propose that we have at least one long thread with our 
expert opinions on international law, given that the IETF is a global 
community.

--Paul Hoffman, Director
--Internet Mail Consortium




RE: can vpn's extended to mobility

2000-09-26 Thread Paul Hoffman / IMC

At 2:19 PM -0700 9/26/00, Dave Crocker wrote:
At 07:56 PM 9/26/00 +0100, Lloyd Wood wrote:
Beg to differ. Encapsulation makes the VPN virtual.
Encryption ensures that the VPN is private.

All networks are privately managed, whether virtual or not; referring
to that explicitly seems a bit pointless to me...


while your explanation is entirely logical and reasonable, it does 
not match the actual history of the term.

The "actual history" is not what is important here; what the "actual 
customers" expect is important. We are seeing more an more ISPs 
offering VPNs, some using IPsec, some not.

the term vpn has always been independent use of encryption.

That was true up to about three years ago, but it shifted when IPsec 
became widely deployed. VPN-as-frame-relay pretty much fell out of 
the public mind. Now some ISPs are trying to resurrect the old 
"private management" definition because it is much cheaper for them 
than to offer actual privacy.

historically there was -- and pretty much still is -- a distinction 
between public (open) and private networks.  When the network runs 
on top of another network, rather than using its own wires, it is 
called virtual.  hence the composed term "virtual private".

This sounds a whole lot closer to Steve Kent's "virtually private". 
It makes sense in the old "we own the wires" world, but not in 
today's "we care about someone seeing our data" world.

--Paul Hoffman, Director
--Internet Mail Consortium




Interesting article on patents and standards

2000-06-13 Thread Paul Hoffman / IMC

A recent editorial in Microprocessor Report (a pricey but very useful 
newsletter) covers an interesting patent tussle in the RAM market. It 
is relevant to the IETF process in that the features that were 
patented were put into the standards process while the patent owner 
silently moved the patent forwards, something we have seen here. The 
editorial, titled "Ethical Standards", can be found at 
http://www.mpronline.com/mpr_public/editorials/edit14_17.html.

--Paul Hoffman, Director
--Internet Mail Consortium




RE: rfc-editor?

2000-04-14 Thread Paul Hoffman / IMC

At 04:46 PM 4/14/00 +, Bob Braden wrote:
There IS no dark conspiracy here, just people devoting CONSIDERABLE
time and energy (without stock options, I might add) to making the
internet work.

A great idea! Stock options in the RFC Editor function!

- A hot startup of about 25 years (in real time, not Internet time)

- Geekier than Slashdot

- Can change the definition of the Internet by themselves overnight

- Content is created for them by industry leaders for free

- Just look at the demographics of the people who come to their "standards 
portal"

- Imagine how much Cisco or Microsoft would spend to buy them




Re: Device upload for all platforms -- the official HTML WG position

2000-03-01 Thread Paul Hoffman / IMC

Why is this thread being run on the IETF mailing list? The IETF handed off 
responsibility for HTML to the W3C long ago. If the reason is to show 
people that someone has a beef with the way that the W3C is handling HTML, 
that point has been made.

(I can already picture certain IETF folks starting to deluge W3C mailing 
lists when IAB appeals don't go their way...)

--Paul Hoffman, Director
--Internet Mail Consortium